Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments

被引:0
|
作者
Tripunitara, Mahesh V. [1 ]
Carbunar, Bogdan [1 ]
机构
[1] Univ Waterloo, ECE Dept, Waterloo, ON N2L 3G1, Canada
关键词
Access Control; Enforcement; Bloom filter; Efficiency;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address the distributed setting for enforcement of a centralized Role-Based Access Control (RBAC) protection state. We present a new approach for time- and space-efficient access enforcement. Underlying our approach is a data structure that we call a cascade Bloom filter. We describe our approach, provide details about the cascade Bloom filter, its associated algorithms, soundness and completeness properties for those algorithms, and provide an empirical validation for distributed access enforcement of RBAC. We demonstrate that even in low-capability devices such as WiFi network access points, we can perform thousands of access checks in a second.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [1] Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control
    Bloom, Gedare
    Simha, Rahul
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 5 - 15
  • [2] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [3] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [4] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [5] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
  • [6] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud
    Harnal, Shilpi
    Chauhan, R. K.
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26): : 1 - 10
  • [7] A distributed calculus for role-based access control
    Braghin, C
    Gorla, D
    Sassone, V
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 48 - 60
  • [8] Role-based access control for a distributed calculus
    Braghin, Chiara
    Gorla, Daniele
    Sassone, Vladimiro
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (02) : 113 - 155
  • [9] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [10] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110