LOW FLAT RATE $9.90 AUST-WIDE DELIVERY

Close Notification

Your cart does not contain any items

Internet of Things and Access Control

Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems

Shantanu Pal

$278.95   $222.98

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer Nature Switzerland AG
28 January 2022
This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems. It introduces a policy-based access control approach for the IoT that provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. Further, the book discusses an identity-less, asynchronous and decentralized delegation model for the IoT leveraging the advantage of blockchain technology. It also presents an approach of attribute-based identity and examines the notion of trust in an IoT context by considering the uncertainty that exists in such systems. Fully explaining all the techniques used, the book is of interest to engineers, researchers and scientists working in the field of the wireless sensor networks, IoT systems and their access control management.  
By:  
Imprint:   Springer Nature Switzerland AG
Country of Publication:   Switzerland
Edition:   2021 ed.
Volume:   37
Dimensions:   Height: 235mm,  Width: 155mm, 
Weight:   338g
ISBN:   9783030650001
ISBN 10:   3030650006
Series:   Smart Sensors, Measurement and Instrumentation
Pages:   205
Publication Date:  
Audience:   Professional and scholarly ,  College/higher education ,  Undergraduate ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
Introduction.- Background and Related Work.- Developing an IoT Access Control Architecture.- System Implementation and Evaluation.- Modeling and Management of Identity.- Delegation of Access Rights.- Integrating Trust to IoT Access Control.- Conclusion and FutureWork.

See Also