The Axiomatics technical teams across sales engineering, development and customer relations often engage with the Stack Overflow community to get insights and answers. They also contribute knowledge on access control and dynamic authorization. This question on access control models and ABAC vs.
Artech House has just published a book on Attribute Based Access Control, authored by Vincent Hu, David Ferraiolo, Ramaswamy Chandramouli and Richard Kuhn. These names will be familiar to anyone that has followed the history of research in ABAC or other models of access control. For our younger
This Use Case, Federal Mission: Dissemination and Information Sharing using Attribute Based Access Control (ABAC), discusses how an ABAC model can be used to disseminate information between agencies widely and securely. By using a fine-grained, ABAC implementation such as Axiomatics Policy Server
One of the great benefits of Attribute Based Access Control (ABAC) is that it can be as coarse or fine-grained as you need it to be. You start with two attributes: role and data, and you have Role Based Access Control (RBAC). But from there, it gets much more interesting, as you can add as few or