This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open Authorization 2.0 framework along with User managed access and security analysis. Detailed protocol overview and authorization process along with security analysis is discussed in this book including case studies.