Authorization Recycling in RBAC Systems

被引:0
|
作者
Wei, Qiang [1 ]
Beznosov, Konstantin [1 ]
Crampton, Jason
Ripeanu, Matei [1 ]
机构
[1] Univ British Columbia, LERSSE, Vancouver, BC V5Z 1M9, Canada
关键词
SAAM; RBAC; access control; authorization recycling;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization recycling is one technique that has been used to address these challenges. This paper introduces and evaluates the mechanisms for authorization recycling in RBAC enterprise systems. The algorithms that support these mechanisms allow precise and approximate authorization decisions to be made, thereby masking possible failures of the policy decision point and reducing its load. We evaluate these algorithms analytically and using a prototype implementation. Our evaluation results demonstrate that authorization recycling can improve the performance of distributed access control mechanisms.
引用
收藏
页码:63 / 72
页数:10
相关论文
共 50 条
  • [31] Authorization Recycling in Attribute-Based Access Control
    An Y.
    Helil N.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [32] A new authorization model for workflow management system using the RPI-RBAC model
    Lee, SY
    Kim, YM
    Noh, BN
    Lee, HH
    COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 639 - 643
  • [33] Using description logic to determine seniority among RB-RBAC authorization rules
    Xie, Qi
    Liu, Dayou
    Yu, Haibo
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 4062 : 604 - 609
  • [34] Reflective authorization systems
    Ancona, M
    Cazzola, W
    Fernandez, EB
    OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 281 - 281
  • [35] SOFTWARE AUTHORIZATION SYSTEMS
    SUHLER, PA
    BAGHERZADEH, N
    MALEK, M
    ISCOE, N
    IEEE SOFTWARE, 1986, 3 (05) : 34 - 41
  • [36] A unified authorization platform based on RBAC4WAS model for web application system integration
    Zhu, QM
    Li, PF
    Su, Z
    Peide, Q
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 505 - 509
  • [37] Exception resolution service for RBAC systems
    Wei, R.
    Wu, K.
    PROCEEDINGS OF THE 2007 11TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2007, : 840 - +
  • [38] A formal proximity model for RBAC systems
    Gupta, Aditi
    Kirkpatrick, Michael S.
    Bertino, Elisa
    COMPUTERS & SECURITY, 2014, 41 : 52 - 67
  • [39] A Formal Proximity Model for RBAC Systems
    Gupta, Aditi
    Kirkpatrick, Michael
    Bertino, Elisa
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 1 - 10
  • [40] Authorization model for federated systems
    Lect Notes Comput Sci, (99):