Authorization and Access Control
Foundations, Frameworks, and Applications
Samenvatting
Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms
Discusses behavioural analysis of threats and attacks using UML base modelling
Covers use of Oauth2.0 Protocol and UMA for connecting web applications
Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC)
Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework

