Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments

被引:0
|
作者
Tripunitara, Mahesh V. [1 ]
Carbunar, Bogdan [1 ]
机构
[1] Univ Waterloo, ECE Dept, Waterloo, ON N2L 3G1, Canada
关键词
Access Control; Enforcement; Bloom filter; Efficiency;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address the distributed setting for enforcement of a centralized Role-Based Access Control (RBAC) protection state. We present a new approach for time- and space-efficient access enforcement. Underlying our approach is a data structure that we call a cascade Bloom filter. We describe our approach, provide details about the cascade Bloom filter, its associated algorithms, soundness and completeness properties for those algorithms, and provide an empirical validation for distributed access enforcement of RBAC. We demonstrate that even in low-capability devices such as WiFi network access points, we can perform thousands of access checks in a second.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [21] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    [J]. 2003, Huazhong University of Science and Technology (31):
  • [22] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    [J]. PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
  • [23] Role-Based Access Control (RBAC) in Java via proxy objects using annotations
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada
    [J]. Proc. ACM Symp. Access Control Models Technol. SACMAT, (79-88):
  • [24] RBAC standard rationale - Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
    Ferraiolo, David
    Kuhn, Rick
    Sandhu, Ravi
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (06) : 51 - 53
  • [25] RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain
    Xu, Zhiyu
    Jiao, Tengyun
    Yang, Lin
    Liu, Donghai
    Wen, Sheng
    Xiang, Yang
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 439 - 453
  • [26] Automated and Efficient Analysis of Role-Based Access Control with Attributes
    Armando, Alessandro
    Ranise, Silvio
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
  • [27] An application of directory service markup language (DSML) for role-based access control (RBAC)
    Shin, DW
    Ahn, GJ
    Park, JS
    [J]. 26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 934 - 939
  • [28] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
    Cadenhead, Tyrone
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 209 - 224
  • [29] Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents
    Algarin, Alberto De la Rosa
    Ziminski, Timoteus B.
    Demurjian, Steven A.
    Sanchez, Yaira K. Rivera
    Kuykendall, Robert
    [J]. WEB INFORMATION SYSTEMS AND TECHNOLOGIES, WEBIST 2013, 2014, 189 : 21 - 36
  • [30] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184