ORPP logo

Identity Management for Internet of Things. (Record no. 109632)

MARC details
000 -LEADER
fixed length control field 05524nam a22004813i 4500
001 - CONTROL NUMBER
control field EBC4509473
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729130440.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2015 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788793102910
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9788793102903
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC4509473
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL4509473
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr11247330
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)957125082
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.5915 .M343 2015
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.678
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mahalle, Parikshit N.
245 10 - TITLE STATEMENT
Title Identity Management for Internet of Things.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Aalborg :
Name of producer, publisher, distributor, manufacturer River Publishers,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (185 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement River Publishers Series in Communications Series
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half Title -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- List of Figures -- List of Tables -- List of Acronyms -- 1. Internet of Things Overview -- 1.1 Overview -- 1.1.1 Internet of Things: Vision -- 1.1.2 Emerging Trends -- 1.1.3 Economic Significance -- 1.2 Technical Building Blocks -- 1.2.1 Internet of Things Layered Architecture -- 1.2.2 RFID and Internet of Things -- 1.2.2.1 EPCIS -- 1.2.2.2 ONS -- 1.2.3 IP for Things -- 1.3 Issues and Challenges -- 1.3.1 Design Issues -- 1.3.2 Technological Challenges -- 1.3.3 Security Challenges -- 1.4 Applications -- 1.4.1 Manufacturing, Logistic and Relay -- 1.4.2 Energy and Utilities -- 1.4.3 Intelligent Transport -- 1.4.4 Environmental Monitoring -- 1.4.5 Home Management -- 1.4.6 eHealth -- 1.5 Conclusions -- References -- 2. Elements of Internet of Things Security -- 2.1 Introduction -- 2.1.1 Vulnerabilities of IoT -- 2.1.2 Security Requirements -- 2.1.3 Challenges for Secure Internet of Things -- 2.2 Threat Modeling -- 2.2.1 Threat Analysis -- 2.2.2 Use Cases and Misuse Cases -- 2.2.3 Activity Modeling and Threats -- 2.2.4 IoT Security Tomography -- 2.3 Key Elements -- 2.3.1 Identity Establishment -- 2.3.2 Access Control -- 2.3.3 Data and Message Security -- 2.3.4 Non-repudiation and Availability -- 2.3.5 Security Model for IoT -- 2.4 Conclusions -- Referneces -- 3. Identity Management Models -- 3.1 Introduction -- 3.1.1 Identity Management -- 3.1.1.1 Identifiers in IoT -- 3.1.1.2 Identification and identifier format -- 3.1.2 Identity Portrayal -- 3.1.3 RelatedWorks -- 3.2 Different Identity Management Models -- 3.2.1 Local Identity -- 3.2.2 Network Identity -- 3.2.3 Federated Identity -- 3.2.4 GlobalWeb Identity -- 3.3 Identity Management in Internet of Things -- 3.3.1 User-centric Identity Management -- 3.3.2 Device-centric Identity Management.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.3.3 Hybrid Identity Management -- 3.4 Conclusions -- References -- 4. Identity Management and Trust -- 4.1 Introduction -- 4.1.1 Motivation -- 4.1.2 Trust Management Life Cycle -- 4.1.3 State of the Art -- 4.2 Identity and Trust -- 4.2.1 Third Party Approach -- 4.2.2 Public Key Infrastructure -- 4.2.3 Attribute Certificates -- 4.2.3.1 Binding information -- 4.2.3.2 Attribute information -- 4.3 Web of Trust Models -- 4.3.1 Web Services Security -- 4.3.1.1 WS-Security -- 4.3.1.2 WS-Security SOAP header -- 4.3.1.3 WS-Security authentication mechanisms -- 4.3.2 SAML Approach -- 4.3.3 Fuzzy Approach for Trust -- 4.4 Conclusions -- References -- 5. Identity Establishment -- 5.1 Introduction -- 5.1.1 Mutual Identity Establishment in IoT -- 5.1.2 IoT Use Case and Attacks Scenario -- 5.1.3 State of the Art -- 5.2 Cryptosystem -- 5.2.1 Private Key Cryptography -- 5.2.2 Public Key Cryptography -- 5.3 Mutual Identity Establishment Phases -- 5.3.1 Secret Key Generation -- 5.3.2 OneWay Authentication -- 5.3.3 Mutual Authentication -- 5.4 Comparative Discussion -- 5.4.1 Security Protocol Verification Tools -- 5.4.2 Security Analysis -- 5.4.3 Performance Metrics -- 5.5 Conclusions -- References -- 6. Access Control -- 6.1 Introduction -- 6.1.1 Motivation -- 6.1.2 Access Control in Internet of Things -- 6.1.3 Different Access Control Schemes -- 6.1.4 State of the Art -- 6.2 Capability-based Access Control -- 6.2.1 Concept of Capability -- 6.2.2 Identity-based Capability Structure -- 6.2.3 Identity-driven Capability-based Access Control -- 6.3 Implementation Considerations -- 6.3.1 Functional Specifications -- 6.3.2 Access Control Policies Modeling -- 6.3.3 Mobility and Backward Compatibility -- 6.4 Conclusions -- References -- 7. Conclusions -- 7.1 Summary -- 7.2 Identity Management Framework -- Index -- About the Authors.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing-Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers-Access control.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Mahalle, Parikshit N.
Title Identity Management for Internet of Things
Place, publisher, and date of publication Aalborg : River Publishers,c2015
International Standard Book Number 9788793102903
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title River Publishers Series in Communications Series
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4509473">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4509473</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.