Workflow-aware access control for the internet of things:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Passau
2020
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Inhaltsverzeichnis |
Beschreibung: | xxiii, 214 Seiten Illustrationen |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047293578 | ||
003 | DE-604 | ||
005 | 20210621 | ||
007 | t | ||
008 | 210521s2020 a||| m||| 00||| eng d | ||
035 | |a (OCoLC)1252698698 | ||
035 | |a (DE-599)BVBBV047293578 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Kasinathan, Prabhakaran |e Verfasser |4 aut | |
245 | 1 | 0 | |a Workflow-aware access control for the internet of things |c Prabhakaran Kasinathan |
264 | 1 | |a Passau |c 2020 | |
300 | |a xxiii, 214 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Universität Passau |d 2021 | ||
650 | 0 | 7 | |a Blockchain |0 (DE-588)1124028595 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Petri-Netz |0 (DE-588)4045388-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Blockchain |0 (DE-588)1124028595 |D s |
689 | 0 | 1 | |a Petri-Netz |0 (DE-588)4045388-1 |D s |
689 | 0 | 2 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:739-opus4-8915 |
856 | 4 | 1 | |u https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/891 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-8915 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032696878&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032696878 |
Datensatz im Suchindex
_version_ | 1804182468488593408 |
---|---|
adam_text | Contents I Overview 1 1 Introduction 1.1 Problem Statement................................................................................ 1.1.1 Research Questions................................................................... 1.1.2 Goals......................................................................................... 1.2 Related Work......................................................................................... 1.3 Methodology ......................................................................................... 1.4 Research Outcome................................................................................ 1.4.1 Contributions............................................................................ 1.5 Scope of the Thesis................................................................................ 3 5 5 5 6 8 8 10 11 2 Challenges and Requirements 2.1 Security and Privacy............................................................................. 2.1.1 Distributed Authorization....................................................... 2.1.2 Confidentiality and Privacy.................................................... 2.1.3 Attack Escalation Resilience.................................................... 2.1.4 Self-Configuration and Multi-Tenancy .................................. 2.1.5 Fine-Grained Access Control and Integrity............................ 2.1.6 Distributed Accountability....................................................... 2.2 Interoperability andUsability...............................................................
2.2.1 Exception Handling ................................................................ 2.2.2 Support for Requirements Elicitation..................................... 15 15 15 16 17 18 18 20 21 21 22 II 23 Background and Related Work 3 Computer Securityand Access Control 3.1 Static Access Control............................................................................ 3.1.1 Access Control Matrix............................................................. 3.1.2 Access Control List (ACL)....................................................... 3.1.3 Capabilities................................................................................ 3.1.4 Role Based Access Control (RBAC)........................................ 3.1.5 Task Based Access Control (TBAC) ..................................... 3.1.6 Attribute Based Access Control (ABAC)............................... 3.1.7 Discussion................................................................................... 25 28 30 31 31 32 33 33 34 xi
Contents 3.2 Dynamic and History-based AccessControl ....................................... 3.2.1 Security Automata.................................................................... 3.2.2 Service Automata....................................................................... 3.2.3 Edit Automata.......................................................................... Common Access Control Protocols Frameworks............................ 3.3.1 OAuth 2.0 Authorization Framework..................................... 3.3.2 Extensible Access Control Markup Language (XACML) . . 34 35 36 36 36 37 37 4 Modeling Workflows 4.1 Petri Nets............................................................................................... 4.1.1 Timed Petri Nets (TPN).......................................................... 4.1.2 Colored Petri Nets (CPN)....................................................... 4.1.3 High-level Petri Nets................................................................. 4.1.4 Workflow Nets (WF-net).......................................................... 4.1.5 Open Petri Nets ....................................................................... 4.2 Automata and ProcessAlgebra............................................................ 4.3 Business Process Modeling.................................................................... 4.4 Advantages and Disadvantages of differentModeling Techniques . . 4.4.1 Advantages of Petri Nets over other approaches................... 39 39 41 41 41 41 41 42 43 43 46 5 Internet of Things (loT) 5.1 Issues in Constrained IoT
Devices....................................................... 5.2 Authorization for Constrained IoT Devices........................................ 47 48 49 6 Distributed Ledger Technology 6.1 Blockchain............................................................................................... 6.2 Smart Contracts ................................................................................... 51 51 52 7 State-of-the-Art Analysis 7.1 Legal and Contractual Frameworks.................................................... 7.2 Workflow Management Systems.......................................................... 7.3 Access Control Mechanisms................................................................. 55 56 56 57 8 Related Work 8.1 Workflow Specification . ....................................................................... 8.2 Internet of Things ................................................................................ 8.3 Smart Contract Generation................................................................. 59 59 60 63 III Contributions 67 9 Actors and Definitions 9.1 Actors..................................................................................................... 9.2 WFAC Definitions ................................................................................ 9.3 Contributions Overview....................................................................... 69 69 71 74 3.3 xii
Contents 10 Workflow Specification and Execution 10.1 Petri Nets for Workflow Specification and Execution ..................... 10.1.1 Extension to Petri Nets Places and Tokens........................... 10.1.2 Extension to Petri Nets Transitions........................................ 10.1.3 Analyzability of Petri Nets Extensions.................................. 10.1.4 Dynamic Workflows................................................................ 10.2 Usability.................................................................................................. 10.2.1 Systems Modeling Language (SysML) -Activity Diagram . 77 77 78 80 83 83 84 85 11 Internet-of-Things (loT) Protocols and Services 11.1 Privacy Enhanced Tokens (PAT) for constrained IoT Devices .... 11.2 Receipt Tokens...................................................................................... 87 87 91 12 Distributed Accountability and Access Control 95 12.1 Secure Smart Contract Generation Framework.................................. 96 12.1.1 Petri Net Workflow Visual Modeling..................................... 99 12.1.2 Petri Net Simulation Engine........................................................101 12.1.3 Petri Net Verification Engine.....................................................101 12.1.4 Petri Net to Smart Contract TranslationEngine....................... 103 12.1.5 Advantages of our Petri Nets based Secure Smart Contract Generation Framework................................................................. 104 13 WFAC Framework and Implementation 107 13.1 Workflow-Aware Access
Control (WFAC) Framework......................... 107 13.1.1 WFAC Architecture.................................................................... 108 13.1.2 WFAC Framework Usage...........................................................115 13.2 WFAC Implementation............................................................................. 118 13.2.1 Demo Use Case............................................................................. 119 13.2.2 Petri Nets Library....................................................................... 120 13.2.3 Workflow Application................................................................. 121 IV Evaluation 125 14 Security Analysis of Workflow-Aware Access Control Framework 127 14.1 Threat Modeling...................................................................................... 127 14.2 Web Security Analysis............................................................................. 129 14.3 Attackers ...................................................................................................132 14.3.1 Attacker Models.......................................................................... 134 14.3.2 Attacker-1...................................................................................... 135 14.3.3 Attacker-2.......................................................................................136 14.3.4 Attacker-3...................................................................................... 136 14.4 Recommendations ...................................................................................
138 15 Use Cases 139 xiii
Contents 15.1 15.2 15.3 15.4 15.5 V Building Automation.................................................................................139 Connected Mobility Lab (CML).............................................................. 143 Car Sharing................................................................................................149 Supply Chain.............................................................................................152 Use Case Discussion.................................................................................155 15.5.1 IoT devices and their capabilities............................................... 155 15.5.2 Handhelds and their capabilities ............................................... 156 15.5.3 Distributed and decentralized ledger.........................................157 Synopsis 159 16 Conclusion 161 16.1 Discussion...................................................................................................163 16.2 Future Work .............................................................................................165 16.2.1 Smart Contract Generation........................................................ 166 16.2.2 EU Funded Research Projects..................................................... 166 16.2.3 Local Reasöner..............................................................................166 Bibliography VI Supplemental Information 169 185 A Petri Nets Workflows 187 A.l Petri Net Markup Language (PNML) example......................................187 A.2 Smart Contract Generation Solidity Code
............................................187 В Privacy Enhanced Tokens (PAT) Profile 191 B.l RS - AS: Security Association Setup ............................................... 191 B.2 [CL - RS : Resource-Request] .............................................................. 191 B.3 [RS - CL : Un-Authorized-Request(AS-Info)]......................................192 B.4 CL - AS : Security Association Setup............................................... 194 B.5 CL - AS : Access-Request .................................................................... 194 B.6 CL - AS : Access-Response.................................................................... 194 B.6.1 Access-Token construction: ............................................. 196 B.6.2 Verifier or PoP keyconstruction:................................................ 197 B.7 CL - RS : Resource-Request................................................................. 197 B.8 RS - CL : Resource-Response.................................................... ... . 201 B.8.1 RS Response-codes to CL...........................................................203 B.9 Construction of Derived-Tokens (DT).....................................................203 Glossary 207 Acronyms 209 XIV
|
adam_txt |
Contents I Overview 1 1 Introduction 1.1 Problem Statement. 1.1.1 Research Questions. 1.1.2 Goals. 1.2 Related Work. 1.3 Methodology . 1.4 Research Outcome. 1.4.1 Contributions. 1.5 Scope of the Thesis. 3 5 5 5 6 8 8 10 11 2 Challenges and Requirements 2.1 Security and Privacy. 2.1.1 Distributed Authorization. 2.1.2 Confidentiality and Privacy. 2.1.3 Attack Escalation Resilience. 2.1.4 Self-Configuration and Multi-Tenancy . 2.1.5 Fine-Grained Access Control and Integrity. 2.1.6 Distributed Accountability. 2.2 Interoperability andUsability.
2.2.1 Exception Handling . 2.2.2 Support for Requirements Elicitation. 15 15 15 16 17 18 18 20 21 21 22 II 23 Background and Related Work 3 Computer Securityand Access Control 3.1 Static Access Control. 3.1.1 Access Control Matrix. 3.1.2 Access Control List (ACL). 3.1.3 Capabilities. 3.1.4 Role Based Access Control (RBAC). 3.1.5 Task Based Access Control (TBAC) . 3.1.6 Attribute Based Access Control (ABAC). 3.1.7 Discussion. 25 28 30 31 31 32 33 33 34 xi
Contents 3.2 Dynamic and History-based AccessControl . 3.2.1 Security Automata. 3.2.2 Service Automata. 3.2.3 Edit Automata. Common Access Control Protocols Frameworks. 3.3.1 OAuth 2.0 Authorization Framework. 3.3.2 Extensible Access Control Markup Language (XACML) . . 34 35 36 36 36 37 37 4 Modeling Workflows 4.1 Petri Nets. 4.1.1 Timed Petri Nets (TPN). 4.1.2 Colored Petri Nets (CPN). 4.1.3 High-level Petri Nets. 4.1.4 Workflow Nets (WF-net). 4.1.5 Open Petri Nets . 4.2 Automata and ProcessAlgebra. 4.3 Business Process Modeling. 4.4 Advantages and Disadvantages of differentModeling Techniques . . 4.4.1 Advantages of Petri Nets over other approaches. 39 39 41 41 41 41 41 42 43 43 46 5 Internet of Things (loT) 5.1 Issues in Constrained IoT
Devices. 5.2 Authorization for Constrained IoT Devices. 47 48 49 6 Distributed Ledger Technology 6.1 Blockchain. 6.2 Smart Contracts . 51 51 52 7 State-of-the-Art Analysis 7.1 Legal and Contractual Frameworks. 7.2 Workflow Management Systems. 7.3 Access Control Mechanisms. 55 56 56 57 8 Related Work 8.1 Workflow Specification . . 8.2 Internet of Things . 8.3 Smart Contract Generation. 59 59 60 63 III Contributions 67 9 Actors and Definitions 9.1 Actors. 9.2 WFAC Definitions . 9.3 Contributions Overview. 69 69 71 74 3.3 xii
Contents 10 Workflow Specification and Execution 10.1 Petri Nets for Workflow Specification and Execution . 10.1.1 Extension to Petri Nets Places and Tokens. 10.1.2 Extension to Petri Nets Transitions. 10.1.3 Analyzability of Petri Nets Extensions. 10.1.4 Dynamic Workflows. 10.2 Usability. 10.2.1 Systems Modeling Language (SysML) -Activity Diagram . 77 77 78 80 83 83 84 85 11 Internet-of-Things (loT) Protocols and Services 11.1 Privacy Enhanced Tokens (PAT) for constrained IoT Devices . 11.2 Receipt Tokens. 87 87 91 12 Distributed Accountability and Access Control 95 12.1 Secure Smart Contract Generation Framework. 96 12.1.1 Petri Net Workflow Visual Modeling. 99 12.1.2 Petri Net Simulation Engine.101 12.1.3 Petri Net Verification Engine.101 12.1.4 Petri Net to Smart Contract TranslationEngine. 103 12.1.5 Advantages of our Petri Nets based Secure Smart Contract Generation Framework. 104 13 WFAC Framework and Implementation 107 13.1 Workflow-Aware Access
Control (WFAC) Framework. 107 13.1.1 WFAC Architecture. 108 13.1.2 WFAC Framework Usage.115 13.2 WFAC Implementation. 118 13.2.1 Demo Use Case. 119 13.2.2 Petri Nets Library. 120 13.2.3 Workflow Application. 121 IV Evaluation 125 14 Security Analysis of Workflow-Aware Access Control Framework 127 14.1 Threat Modeling. 127 14.2 Web Security Analysis. 129 14.3 Attackers .132 14.3.1 Attacker Models. 134 14.3.2 Attacker-1. 135 14.3.3 Attacker-2.136 14.3.4 Attacker-3. 136 14.4 Recommendations .
138 15 Use Cases 139 xiii
Contents 15.1 15.2 15.3 15.4 15.5 V Building Automation.139 Connected Mobility Lab (CML). 143 Car Sharing.149 Supply Chain.152 Use Case Discussion.155 15.5.1 IoT devices and their capabilities. 155 15.5.2 Handhelds and their capabilities . 156 15.5.3 Distributed and decentralized ledger.157 Synopsis 159 16 Conclusion 161 16.1 Discussion.163 16.2 Future Work .165 16.2.1 Smart Contract Generation. 166 16.2.2 EU Funded Research Projects. 166 16.2.3 Local Reasöner.166 Bibliography VI Supplemental Information 169 185 A Petri Nets Workflows 187 A.l Petri Net Markup Language (PNML) example.187 A.2 Smart Contract Generation Solidity Code
.187 В Privacy Enhanced Tokens (PAT) Profile 191 B.l RS - AS: Security Association Setup . 191 B.2 [CL - RS : Resource-Request] . 191 B.3 [RS - CL : Un-Authorized-Request(AS-Info)].192 B.4 CL - AS : Security Association Setup. 194 B.5 CL - AS : Access-Request . 194 B.6 CL - AS : Access-Response. 194 B.6.1 Access-Token construction: . 196 B.6.2 Verifier or PoP keyconstruction:. 197 B.7 CL - RS : Resource-Request. 197 B.8 RS - CL : Resource-Response. . . 201 B.8.1 RS Response-codes to CL.203 B.9 Construction of Derived-Tokens (DT).203 Glossary 207 Acronyms 209 XIV |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kasinathan, Prabhakaran |
author_facet | Kasinathan, Prabhakaran |
author_role | aut |
author_sort | Kasinathan, Prabhakaran |
author_variant | p k pk |
building | Verbundindex |
bvnumber | BV047293578 |
classification_rvk | ST 277 |
collection | ebook |
ctrlnum | (OCoLC)1252698698 (DE-599)BVBBV047293578 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01965nam a2200445 c 4500</leader><controlfield tag="001">BV047293578</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210621 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210521s2020 a||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1252698698</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047293578</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kasinathan, Prabhakaran</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Workflow-aware access control for the internet of things</subfield><subfield code="c">Prabhakaran Kasinathan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Passau</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 214 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Passau</subfield><subfield code="d">2021</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchain</subfield><subfield code="0">(DE-588)1124028595</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Petri-Netz</subfield><subfield code="0">(DE-588)4045388-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Blockchain</subfield><subfield code="0">(DE-588)1124028595</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Petri-Netz</subfield><subfield code="0">(DE-588)4045388-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:739-opus4-8915</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/891</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-8915</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032696878&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032696878</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV047293578 |
illustrated | Illustrated |
index_date | 2024-07-03T17:21:05Z |
indexdate | 2024-07-10T09:08:02Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032696878 |
oclc_num | 1252698698 |
open_access_boolean | 1 |
owner | DE-739 |
owner_facet | DE-739 |
physical | xxiii, 214 Seiten Illustrationen |
psigel | ebook |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
record_format | marc |
spelling | Kasinathan, Prabhakaran Verfasser aut Workflow-aware access control for the internet of things Prabhakaran Kasinathan Passau 2020 xxiii, 214 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Dissertation Universität Passau 2021 Blockchain (DE-588)1124028595 gnd rswk-swf Petri-Netz (DE-588)4045388-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet der Dinge (DE-588)7713781-4 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Blockchain (DE-588)1124028595 s Petri-Netz (DE-588)4045388-1 s Internet der Dinge (DE-588)7713781-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus4-8915 https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/891 Verlag kostenfrei Volltext https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-8915 Resolving-System kostenfrei Volltext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032696878&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kasinathan, Prabhakaran Workflow-aware access control for the internet of things Blockchain (DE-588)1124028595 gnd Petri-Netz (DE-588)4045388-1 gnd Computersicherheit (DE-588)4274324-2 gnd Internet der Dinge (DE-588)7713781-4 gnd |
subject_GND | (DE-588)1124028595 (DE-588)4045388-1 (DE-588)4274324-2 (DE-588)7713781-4 (DE-588)4113937-9 |
title | Workflow-aware access control for the internet of things |
title_auth | Workflow-aware access control for the internet of things |
title_exact_search | Workflow-aware access control for the internet of things |
title_exact_search_txtP | Workflow-aware access control for the internet of things |
title_full | Workflow-aware access control for the internet of things Prabhakaran Kasinathan |
title_fullStr | Workflow-aware access control for the internet of things Prabhakaran Kasinathan |
title_full_unstemmed | Workflow-aware access control for the internet of things Prabhakaran Kasinathan |
title_short | Workflow-aware access control for the internet of things |
title_sort | workflow aware access control for the internet of things |
topic | Blockchain (DE-588)1124028595 gnd Petri-Netz (DE-588)4045388-1 gnd Computersicherheit (DE-588)4274324-2 gnd Internet der Dinge (DE-588)7713781-4 gnd |
topic_facet | Blockchain Petri-Netz Computersicherheit Internet der Dinge Hochschulschrift |
url | https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/891 https://nbn-resolving.de/urn:nbn:de:bvb:739-opus4-8915 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032696878&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kasinathanprabhakaran workflowawareaccesscontrolfortheinternetofthings |