Proceedings of the 2008 ACM Workshop on Secure Web Services 2008
DOI: 10.1145/1456492.1456499
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of XACML PDP implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
36
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(38 citation statements)
references
References 3 publications
2
36
0
Order By: Relevance
“…While this approach supports separation of concerns and the specification of fine-grained policies, it can also introduce a considerable overhead when the size of the search result set increases. This is especially true for fine-grained rules, typically included in attribute-based policies [22]. Our approach does not suffer from this problem.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…While this approach supports separation of concerns and the specification of fine-grained policies, it can also introduce a considerable overhead when the size of the search result set increases. This is especially true for fine-grained rules, typically included in attribute-based policies [22]. Our approach does not suffer from this problem.…”
Section: Background and Related Workmentioning
confidence: 99%
“…While both XACML and STAPL support fine-grained specification of access rules, their policy evaluation process also involves a considerable overhead [22]. For traditional request-response applications, this overhead is in many cases acceptable.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…a Service whose resources are willing to be accessed by the Device) and one of its administrators (the Service Admin), as well as an Identity Provider (IdP) and the Policy Administration, Decision and Enforcement Points (PAP, PDP and PEP). The last three are the components that make the widely known access control architecture [9]. Besides, we have included a Policies DB where policies are stored by the PAP and checked by the PDP.…”
Section: ) Delegatedmentioning
confidence: 99%
“…However, XACML is relatively heavyweight and expensive to implement (Turkmen & Crispo, 2008), especially in the context of low power devices. To address this, Webinos has developed an engine which can calculate the subset of the policy that is relevant to a particular device.…”
Section: A5: Device Access Controlmentioning
confidence: 99%