2011
DOI: 10.1145/1952982.1952985
|View full text |Cite
|
Sign up to set email alerts
|

Authorization recycling in hierarchical RBAC systems

Abstract: As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization caching, which enables the reuse of previous authorization decisions, is one technique that has been used to address these challenges.This article introduces and evaluates the mechanisms for authorization "recycling" in RBAC enterprise… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…As part of future work, we plan to assess the end-to-end performance of a system integrating MORRO under different evaluation settings, such as a production configuration deployed on an elastic cloud infrastructure. We also plan to optimize MORRO in terms of time efficiency by adopting cache-based enforcement [24,52], and in terms of space efficiency, by adopting the Kevoree Modeling Framework (KMF) [22], which is optimized for manipulating models at run time on large distributed systems.…”
Section: Discussionmentioning
confidence: 99%
“…As part of future work, we plan to assess the end-to-end performance of a system integrating MORRO under different evaluation settings, such as a production configuration deployed on an elastic cloud infrastructure. We also plan to optimize MORRO in terms of time efficiency by adopting cache-based enforcement [24,52], and in terms of space efficiency, by adopting the Kevoree Modeling Framework (KMF) [22], which is optimized for manipulating models at run time on large distributed systems.…”
Section: Discussionmentioning
confidence: 99%
“…However, it is also worth pointing out that concrete access control policies tend to be more structured than randomly generated ones, and as such, model checking can be more efficient. In addition, some decisions can be cached [16]. Hence, these results should not necessarily be interpreted as providing an average computation time based on the size of the policy, but rather as an indication that · N can be first used for evaluation, since it is relatively fast, and in case of indeterminacy, · min and · max can be used to try to decide on a conclusive decision based on the probabilities of the decisions.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…There has been some interest in recent years in reusing, recycling or caching authorization decisions at policy enforcement points in order to avoid recomputing decisions [7,28,29,36]. These techniques have perceived benefit, in particular, in large-scale, distributed, systems due to demands for reduced latency and a resilience to intermittent communications failures.…”
Section: Chinese Wallmentioning
confidence: 99%