They Wrote the Book on ABAC

Artech House has just published a book on Attribute Based Access Control, authored by Vincent Hu, David Ferraiolo, Ramaswamy Chandramouli and Richard Kuhn. These names will be familiar to anyone that has followed the history of research in ABAC or other models of access control. For our younger audience, as well as all interested parties, this book provides a great foundation on the topic and provides a view into the journey that the industry has taken over the last few decades. 

The authors were kind enough to share a draft copy with me and I was immediately impressed with both the introductory sections as well as the later sections that dig into the details of ABAC models. There is something here for architects, info security practitioners, developers, operations and management. A book project like this is a huge effort and will be very beneficial to the industry – many thanks to the authors taking on this challenge.

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges.

Get your copy from Artech or Amazon today!

Other Blogs

3 keys to re-evaluate your authorization management
Business
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
Tech
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Business
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...