ABSTRACT

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.

FEATURES

  • Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms
  • Discusses a behavioral analysis of threats and attacks using UML base modeling
  • Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications
  • Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)
  • Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework

This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.

chapter 1|18 pages

Introduction

chapter 2|13 pages

Authorization and Access Control

chapter 3|20 pages

Open Authorization 2.0

chapter 4|17 pages

User-Managed Access

chapter 5|2 pages

Conclusions