Get Discount 5% Off
Subscribe to our newsletters now and stay up-to-date with new arrivals, updates and deals.
Couldn't load pickup availability
1.1 Introduction and Motivation
1.1.1 IoT Architectures
1.1.2 IoT and CPS Security Issues
1.2 Access Control Models
1.2.1 State of the Art
1.2.2 Access Control Models for Smart Connected Systems
1.3 Publish-Subscribe Paradigm1.4 IoT and CPS Integration with Cloud and Edge Computing
1.5 Current Trends
1.6 Access Control Challenges and Research Needs
1.7 Summary
References
2 Access Control Oriented Architectures Supporting IoT and CPS
2.1 Introduction
2.1.1 Chapter Organization
2.2 Primitives for Cloud and Edge Assisted Io
2.2.1 Taxonomy of Smart Devices2.2.2 Cloud and Edge Hybrid Architectures
2.3 Access Control Oriented Architectures
2.3.1 Edge Gateway Supported ACO Architecture
2.3.2 Extended ACO Architecture with Clustered Objects
2.4 Illustrative IoT and CPS using Proposed Architectures
2.4.1 Remote Patient Monitoring (RPM)
2.4.2 Intelligent Transportation System (ITS)
2.5 Summary
References
3 Authorization Frameworks for Smart and Connected Ecosystems 9
3.1 Introduction
3.1.1 Chapter Organization
3.2 Access Control Framework for Cloud Enabled Wearable IoT3.2.1 Access Control Framework
3.2.2 RPM Wearable IoT Use Case
3.3 Framework for Smart Connected Cars Ecosystem
3.3.1 Access Control Framework
3.3.2 Identified Access Control Approaches
3.3.3 Single and Multi-Cloud Cyber Physical Systems
3.4 Objectives of Proposed Frameworks
3.5 Summary
References
4 Access Control Models in Cloud IoT Services
4.1 Introduction
4.1.1 Chapter Organization 4
4.2 AWS Access Control Model54.3 Access Control in AWS Internet of Things: AWS-IoTAC
4.3.1 Motivation 8
4.3.2 Formal Model and Definitions
4.3.3 AWS-IoTAC and ACO Architecture
4.3.4 Use Case
4.4 Google Cloud Platform Access Control Model
4.4.1 GCP Access Control (GCPAC) Model4.4.2 Access Control in GCP Internet of Things
4.4.3 E-Health Use Case
4.5 Limitations and Fine Grained Enhancements
4.5.1 Proposed Enhancements in AWS IoTAC
4.5.2 Proposed Enhancements in GCP IoTAC
4.6 Summary
References5 Secure Virtual Objects Communication
5.1 Introduction
5.1.1 Chapter Organization5.2 Operational Access Control for VO Communication
5.2.1 ACL and Capability Based (ACL-Cap) Operational Model
5.2.2 ABAC Operational Model
5.2.3 RBAC Limitations
5.3 Administrative Access Control for VO Communication
5.3.1 Administrative ACL Model
5.3.2 Administrative RBAC Model
5.3.3 Administrative ABAC Model
5.4 AWS-IoT-ACMVO Model for AWS IoT Shadows Communication
5.5 Issues in enforcing ACO-IoT-ACMsVO within AWS-IoT-ACMVO5.6 A Use Case: Sensing Speeding Cars
5.6.1 Sensing the Speed of a Single Car
5.6.2 Sensing the Speed of Multiple Cars
5.6.3 Performance Evaluation and Discussion
5.7 Summary
References
6 Attribute Based Access Control for Intelligent Transportation5
6.1 Introduction
6.1.1 Chapter Organization
6.2 Authorization Requirements in ITS6.2.1 Multi-Layer and User Privacy Preferences
6.2.2 Relevance of Groups
6.3 Dynamic Groups and ABAC Model
6.3.1 CV-ABACG Model Overview
6.3.2 Components Definitions
6.4 AWS Enforcement6.4.1 Use Case Overview
6.4.2 Prototype Implementation
6.4.3 Performance Evaluation
6.5 Summary
References
7 Fine Grained Communication Contr
Author: Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri
Publisher: Springer
Published: 02/05/2022
Pages: 173
Binding Type: Hardcover
Weight: 0.97lbs
Size: 9.21h x 6.14w x 0.50d
ISBN: 9783030810887
About the Author
Maanak Gupta is an Assistant Professor in the Department of Computer Science at Tennessee Tech University, USA. He received his Ph.D. in Computer Science from the University of Texas at San Antonio and has worked as a Postdoctoral Research Fellow at the Institute for Cyber Security. He also holds an M.S. degree in Information Systems from Northeastern University, Boston. His primary area of research includes security and privacy in cyber space focused in studying foundational aspects of access control and their application in technologies including cyber physical systems, cloud computing, IoT and Big data. Dr Gupta has worked in developing novel security mechanisms, models and architectures for next generation smart cars, smart cities, intelligent transportation systems and smart farming. He is also interested in machine learning based malware analysis and AI assisted cyber security solutions. His scholarly work is regularly published at top peer-reviewed security venues including ACM SIGSAC conferences and refereed journals. He was awarded the 2019 computer science outstanding doctoral dissertation research award from UT San Antonio. His research has been funded by the US National Science Foundation (NSF), NASA, US Department of Defense (DoD) and private industry.
You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).
You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).
If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.
We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.
When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.
Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.
Subscribe to our newsletters now and stay up-to-date with new arrivals, updates and deals.
Thanks for subscribing!
This email has been registered!
Product | SKU | Description | Collection | Availability | Product Type | Other Details |
---|