Access Control Models and Architectures for Iot and Cyber Physical Systems
Home > Technology & Engineering > Energy technology & engineering > Electrical engineering > Power generation & distribution > Access Control Models and Architectures for Iot and Cyber Physical Systems
Access Control Models and Architectures for Iot and Cyber Physical Systems

Access Control Models and Architectures for Iot and Cyber Physical Systems


     0     
5
4
3
2
1



Available


About the Book

1 Introduction: Requirements for Access Control in IoT and CPS

1.1 Introduction and Motivation

1.1.1 IoT Architectures

1.1.2 IoT and CPS Security Issues

1.2 Access Control Models

1.2.1 State of the Art

1.2.2 Access Control Models for Smart Connected Systems

1.3 Publish-Subscribe Paradigm

1.4 IoT and CPS Integration with Cloud and Edge Computing

1.5 Current Trends

1.6 Access Control Challenges and Research Needs

1.7 Summary

References

2 Access Control Oriented Architectures Supporting IoT and CPS

2.1 Introduction

2.1.1 Chapter Organization

2.2 Primitives for Cloud and Edge Assisted Io

2.2.1 Taxonomy of Smart Devices

2.2.2 Cloud and Edge Hybrid Architectures

2.3 Access Control Oriented Architectures

2.3.1 Edge Gateway Supported ACO Architecture

2.3.2 Extended ACO Architecture with Clustered Objects

2.4 Illustrative IoT and CPS using Proposed Architectures

2.4.1 Remote Patient Monitoring (RPM)

2.4.2 Intelligent Transportation System (ITS)

2.5 Summary

References

3 Authorization Frameworks for Smart and Connected Ecosystems 9

3.1 Introduction

3.1.1 Chapter Organization

3.2 Access Control Framework for Cloud Enabled Wearable IoT

3.2.1 Access Control Framework

3.2.2 RPM Wearable IoT Use Case

3.3 Framework for Smart Connected Cars Ecosystem

3.3.1 Access Control Framework

3.3.2 Identified Access Control Approaches

3.3.3 Single and Multi-Cloud Cyber Physical Systems

3.4 Objectives of Proposed Frameworks

3.5 Summary

References

4 Access Control Models in Cloud IoT Services

4.1 Introduction

4.1.1 Chapter Organization 4

4.2 AWS Access Control Model5

4.3 Access Control in AWS Internet of Things: AWS-IoTAC

4.3.1 Motivation 8

4.3.2 Formal Model and Definitions

4.3.3 AWS-IoTAC and ACO Architecture

4.3.4 Use Case

4.4 Google Cloud Platform Access Control Model

4.4.1 GCP Access Control (GCPAC) Model

4.4.2 Access Control in GCP Internet of Things

4.4.3 E-Health Use Case

4.5 Limitations and Fine Grained Enhancements

4.5.1 Proposed Enhancements in AWS IoTAC

4.5.2 Proposed Enhancements in GCP IoTAC

4.6 Summary

References

5 Secure Virtual Objects Communication

5.1 Introduction

5.1.1 Chapter Organization

5.2 Operational Access Control for VO Communication

5.2.1 ACL and Capability Based (ACL-Cap) Operational Model

5.2.2 ABAC Operational Model

5.2.3 RBAC Limitations

5.3 Administrative Access Control for VO Communication

5.3.1 Administrative ACL Model

5.3.2 Administrative RBAC Model

5.3.3 Administrative ABAC Model

5.4 AWS-IoT-ACMVO Model for AWS IoT Shadows Communication

5.5 Issues in enforcing ACO-IoT-ACMsVO within AWS-IoT-ACMVO

5.6 A Use Case: Sensing Speeding Cars

5.6.1 Sensing the Speed of a Single Car

5.6.2 Sensing the Speed of Multiple Cars

5.6.3 Performance Evaluation and Discussion

5.7 Summary

References

6 Attribute Based Access Control for Intelligent Transportation5

6.1 Introduction

6.1.1 Chapter Organization

6.2 Authorization Requirements in ITS

6.2.1 Multi-Layer and User Privacy Preferences

6.2.2 Relevance of Groups

6.3 Dynamic Groups and ABAC Model

6.3.1 CV-ABACG Model Overview

6.3.2 Components Definitions

6.4 AWS Enforcement

6.4.1 Use Case Overview

6.4.2 Prototype Implementation

6.4.3 Performance Evaluation

6.5 Summary

References

7 Fine Grained Communication Contr
About the Author: Maanak Gupta is an Assistant Professor in the Department of Computer Science at Tennessee Tech University, USA. He received his Ph.D. in Computer Science from the University of Texas at San Antonio and has worked as a Postdoctoral Research Fellow at the Institute for Cyber Security. He also holds an M.S. degree in Information Systems from Northeastern University, Boston. His primary area of research includes security and privacy in cyber space focused in studying foundational aspects of access control and their application in technologies including cyber physical systems, cloud computing, IoT and Big data. Dr Gupta has worked in developing novel security mechanisms, models and architectures for next generation smart cars, smart cities, intelligent transportation systems and smart farming. He is also interested in machine learning based malware analysis and AI assisted cyber security solutions. His scholarly work is regularly published at top peer-reviewed security venues including ACM SIGSAC conferences and refereed journals. He was awarded the 2019 computer science outstanding doctoral dissertation research award from UT San Antonio. His research has been funded by the US National Science Foundation (NSF), NASA, US Department of Defense (DoD) and private industry.

Smriti Bhatt is an Assistant Professor of Computer Science in the Department of Computing and Cyber Security at Texas A&M University-San Antonio. She has received her Ph.D. in Computer Science from the University of Texas at San Antonio and did her doctoral research at the Institute for Cyber Security (ICS) and Center for Security and Privacy Enhanced Cloud Computing (C-SPECC). Dr. Bhatt's research expertise is in the field of Cyber Security, mainly focused on Access Control and Communication Control models, and Security and Privacy in Cloud Computing and the Internet of Things (IoT). Her current research projects focus on developing secure access control and communication control models for Cloud-Enabled IoT architecture applicable to various IoT domains, such as Smart Home, Smart Health, and Wearable IoT. Her research work also expands into deep learning for IoT security with applications in access control and anomaly detection. She has been actively publishing her work on well-regarded conferences and journals in the field, and also continually serves as an expert reviewer for journals (e.g., IEEE Transactions on Cloud, IEEE Access, and Transactions on Dependable and Secure Computing). She have also served as technical program committee member and co-chair for several conferences and workshops. Furthermore, Dr. Bhatt is enthusiastically involved with various national and local organizations including AnitaB.org, Women in CyberSecurity (WiCyS), and San Antonio Women in IT (SAWIT) for enhancing diversity and inclusion in STEM.

Asma Alshehri is an Assistant Professor in Computer Science at Shaqra University, Shaqra, Saudi Arabia. She received M.S. and Ph.D. in Computer Science from the University of Texas at San Antonio (UTSA). It was her honor to be the first Arabian women to work and graduate from the Institute for Cyber Security (ICS), UTSA. Her primary area of research includes security and privacy in cyber space focused in studying foundational aspects of access control and their application in technologies including cloud computing, IoT and Big Data. She has worked in developing novel security mechanisms, models, and architectures for IoT smart cities, cars, and homes. She is also interested in malware analysis and AI assisted cyber security solutions. She is currently the Vice Dean of IT and E-learning Deanship at Shaqra University, Head of E-learning Unit at University Agency for Educational Affair, and Chair of Computer Science Department at Collage of Science and Humanities at Dhurma. She holds a B.S. degree in Computer Science from Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia

Ravi Sandhu is Professor of Computer Science, Executive Director of the Institute for Cyber Security and Lead PI of the NSF Center for Security and Privacy Enhanced Cloud Computing at the University of Texas at San Antonio, where he holds the Lutcher Brown Endowed Chair in Cyber Security. Previously he served on the faculty at George Mason University (1989-2007) and Ohio State University (1982-1989). He holds BTech and MTech degrees from IIT Bombay and Delhi, and MS and PhD degrees from Rutgers University. He is a Fellow of IEEE, ACM and AAAS, and has received numerous awards from IEEE, ACM, NSA, NIST and IFIP, including the 2018 IEEE Innovation in Societal Infrastructure award for seminal work on role-based access control (RBAC). A prolific and highly cited author, his research has been funded by NSF, NSA, NIST, DARPA, AFOSR, ONR, AFRL, ARO and private industry. His seminal papers on role-based access control established it as the dominant form of access control in practical systems. His numerous other models and mechanisms have also had considerable real-world impact. He served as Editor-in-Chief of the IEEE Transactions on Dependable and Secure Computing, and previously as founding Editor-in-Chief of ACM Transactions on Information and System Security. He was Chairman of ACM SIGSAC, and founded the ACM Conference on Computer and Communications Security, the ACM Symposium on Access Control Models and Technologies and the ACM Conference on Data and Application Security and Privacy. He has served as General Chair, Steering Committee Chair, Program Chair and Committee Member for numerous security conferences. He has consulted for leading industry and government organizations, and has lectured all over the world. He is an inventor on 31 security technology patents and has accumulated over 45,000 Google Scholar citations for his papers. At UTSA his team seeks to pursue world-leading research in both the scientific foundations of cyber security and their applications in diverse 21st century cyber technology domains, including cloud computing, internet of things, autonomous vehicles, big data and blockchain. Particular focus is on foundations and technology of attribute-based access control (ABAC) as a successor to RBAC in these contexts


Best Sellers



Product Details
  • ISBN-13: 9783030810887
  • Publisher: Springer International Publishing
  • Publisher Imprint: Springer
  • Height: 234 mm
  • No of Pages: 190
  • Spine Width: 13 mm
  • Width: 156 mm
  • ISBN-10: 3030810887
  • Publisher Date: 12 Sep 2021
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Weight: 489 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Access Control Models and Architectures for Iot and Cyber Physical Systems
Springer International Publishing -
Access Control Models and Architectures for Iot and Cyber Physical Systems
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Access Control Models and Architectures for Iot and Cyber Physical Systems

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!