Proceedings of the 13th ACM Symposium on Access Control Models and Technologies 2008
DOI: 10.1145/1377836.1377848
|View full text |Cite
|
Sign up to set email alerts
|

Authorization recycling in RBAC systems

Abstract: As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization recycling is one technique that has been used to address these challenges.This paper introduces and evaluates the mechanisms for authorization recycling in RBAC enterprise systems. The algorithms that support these mechanisms allow precise and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
34
1

Year Published

2008
2008
2014
2014

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(37 citation statements)
references
References 21 publications
2
34
1
Order By: Relevance
“…We are not the first to consider such a setting for RBAC; indeed, our work can be seen as a follow-up to the work of Wei et al [26]. We adopt the setting they propose that we reproduce in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We are not the first to consider such a setting for RBAC; indeed, our work can be seen as a follow-up to the work of Wei et al [26]. We adopt the setting they propose that we reproduce in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
“…We seek to also address what we consider a particular shortcoming of the approach of Wei et al [26] -the issue of "cache warmness." In their approach, a PDP does not push state to the SDP.…”
Section: Introductionmentioning
confidence: 99%
“…Approximate recycling predicts an authorization without consulting the PDP during an access request. Wei et al [28,29] applied the SAAM to RBAC. Good performance for authorization recycling depends heavily on cache warmness, which can be a problem especially for short duration sessions or access requests with low temporal locality.…”
Section: Related Workmentioning
confidence: 99%
“…The architecture resulting from adding an SDP to the COPS model, shown in Figure 1, distributes authorization while maintaining a centralized policy. Wei et al [28] show how to use the extended model with RBAC.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in a spatiotemporal authorization mechanism, the system should assume that the user is mobile, and may leave the authorized region. That is, CDAC designs must address the problem of continuity of usage [46,34,12,45,44]. The dynamic nature of contextual data requires that access decisions must be repeatedly evaluated even after the initial request is granted.…”
Section: Enforcement Modelsmentioning
confidence: 99%