2021
DOI: 10.1155/2021/5582921
|View full text |Cite
|
Sign up to set email alerts
|

An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence

Abstract: With the widespread application of new technologies, fine-grained authorization requires a large number of access control policies. However, the existing policy retrieval method applied to a large-scale policy environment has the problem of low retrieval efficiency. Therefore, this paper proposes an attribute access control policy retrieval method based on the binary sequence. This method uses binary identification and binary code to express access control requests and policies. When the policy is retrieved, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Tis is mainly because of the performance bottleneck brought by the extended policy collaboration function in the source domain. At present, there are special methods to improve the efciency of policy retrieval [48]. In addition, due to the irrelevance of domain information and policies in each domain, attribute mapping and policy matching can be performed in parallel.…”
Section: Te Troughput Of Bpfc-sdnsmentioning
confidence: 99%
“…Tis is mainly because of the performance bottleneck brought by the extended policy collaboration function in the source domain. At present, there are special methods to improve the efciency of policy retrieval [48]. In addition, due to the irrelevance of domain information and policies in each domain, attribute mapping and policy matching can be performed in parallel.…”
Section: Te Troughput Of Bpfc-sdnsmentioning
confidence: 99%
“…However, the many attribute values added to ABAC make it more difficult to assign and manage permissions, which has been a drawback of the ABAC model. Literature [27] used binary sequences to reduce the number of matching attribute-value pairs in rules and improve the efficiency of policy retrieval. In fact, the data in IoV are characterized by aggregation.…”
Section: Related Workmentioning
confidence: 99%
“…(2) When the bumps of the vehicle exceed normal conditions, the average bumps data of the road section can help judge whether the current vehicle is Various efficient authentication mechanisms Single, undiversified authentication result [20][21][22][23] Enhance the dynamic nature of RBAC, security, as far as possible to weaken the role of permissions encapsulation generated by the role of granularity issues ere is always the problem of static role permissions. e overall permission system cannot affect role permissions [24][25][26][27][28][29][30][31][32] e ABAC attribute mechanism is used to improve the granularity and the orderliness of permissions. To enhance ABAC security by adding unique attribute values ABAC makes the overall model more difficult to manage as the number of attributes increases.…”
Section: Permission Adjust Requirements In the Emergencies Of Thementioning
confidence: 99%