2010
DOI: 10.1007/978-3-642-11747-3_12
|View full text |Cite
|
Sign up to set email alerts
|

Idea: Efficient Evaluation of Access Control Constraints

Abstract: Business requirements for modern enterprise systems usually comprise a variety of dynamic constraints, i. e., constraints that require a complex set of context information only available at runtime. Thus, the efficient evaluation of dynamic constraints, e. g., expressing separation of duties requirements, becomes an important factor for the overall performance of the access control enforcement.In distributed systems, e. g., based on the service-oriented architecture (SOA), the time for evaluating access contro… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Other possible tactics are (i) introducing caching as explored by Wei et al [15] and (ii) optimizing attribute fetch, an idea first posed by by Brucker and Petritsch [5] and further explored by Gheorghe et al [8] and Decat et al [6]. Finally, an important building block for this paper was the work by Turkmen et al [14], who presented one of the first extensive performance evaluations of XACML evaluation engines.…”
Section: Related Workmentioning
confidence: 94%
“…Other possible tactics are (i) introducing caching as explored by Wei et al [15] and (ii) optimizing attribute fetch, an idea first posed by by Brucker and Petritsch [5] and further explored by Gheorghe et al [8] and Decat et al [6]. Finally, an important building block for this paper was the work by Turkmen et al [14], who presented one of the first extensive performance evaluations of XACML evaluation engines.…”
Section: Related Workmentioning
confidence: 94%
“…Our work is different in that it does not dynamically update the original policy definitions, but implicitly incorporate context into rule evaluation. Brucker and Petritsch [12] enhanced the context handling protocol used in XACML, but they focus on the efficiency of attribute resolution strategies either via the PIP or the XACML context handler.…”
Section: Related Workmentioning
confidence: 99%
“…This work builds upon the idea of improving policy evaluation performance by focusing on attribute fetching, as first introduced by Brucker and Petritsch [25]. Policy federation can be complemented with the work of several other authors, e.g., Wei et al [26], who focus on decision caching and Gheorghe et al [27], who focus on infrastructure reconfiguration for optimal attribute retrieval and cross-request attribute caching.…”
Section: Related Workmentioning
confidence: 99%