Normal view MARC view ISBD view

Attribute-based access control /

By: Hu, Vincent C
Title By: Ferraiolo, David F | Ramaswamy, Chandramouli | Kuhn, D. Richard
Publisher: Boston : Artech House, c2018.Description: xvi, 267 p. : ill. ; 24 cm.ISBN: 9781630811341Subject(s): Computer security | Computers -- Access control | Computer networks -- Access controlDDC classification: 005.8 HU AT Online resources: Location Map
Summary:
This book presents a combination of technical and administrative instructions for the development of attribute-based access control (ABAC) to improve information sharing within organizations. It focuses in particularly on the planning, design, implementation and operation, and explains in depth the history and model of ABAC, its relationship with other access control models. The book includes chapters on related standards, verification and assurance and deployment frameworks such as XACML. Researchers and implementers of these systems will also find an overview of Next Generation Access Model (NGAC), ABAC applications in SOA/workflow domains, ABAC architectures and details on feature sets in commercial and open source products.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Notes Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 HU AT (Browse shelf) Available April 2018 T0058996
Total holds: 0

Access Control Models and Approaches; Attribute Based Access Control; ABAC Deployment using XACML; Next Generation Access Control; ABAC Policy Verifications and Testing; Attribute Consideration; ABAC Deployments in Application Architectures; ABAC Life Cycle Issues (Considerations); ABAC in Commercial Products; Open Source ABAC Implementations- Architectures & Features.

This book presents a combination of technical and administrative instructions for the development of attribute-based access control (ABAC) to improve information sharing within organizations. It focuses in particularly on the planning, design, implementation and operation, and explains in depth the history and model of ABAC, its relationship with other access control models. The book includes chapters on related standards, verification and assurance and deployment frameworks such as XACML. Researchers and implementers of these systems will also find an overview of Next Generation Access Model (NGAC), ABAC applications in SOA/workflow domains, ABAC architectures and details on feature sets in commercial and open source products.

Powered by Koha