dedup_wf_001--86871fe098580bf066c6159ee674c8e7

The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. In massive-scale and complex enterprises, PTP authorization architectures result in fragile and inefficient solutions. They also fail to exploit virtually free CPU resources and network bandwidth. This talk introduces a three-fold approach to improving availability and performance of authorization solutions: employing publish-subscribe technologies, actively recycling authorizations, and flooding PEPs with speculatively precomputed junk authorizations. After introducing the approach, the talk describes in detail the active authorization recycling part. Specifically, it defines the secondary and approximate authorization model (SAAM). In SAAM, approximate authorization responses are inferred from cached primary responses, and therefore provide an alternative source of access control decisions in the event that the authorization server is unavailable or slow. The ability to compute approximate authorizations improves the reliability and performance of access control sub-systems and ultimately the application systems themselves. The operation of a system that employs SAAM depends on the type of access control policy it implements. We propose and analyze algorithms for computing secondary authorizations in the case of policies based on the Bell-LaPadula model. In this context, we define a dominance graph, and describe its construction and usage for generating secondary responses to authorization requests. Preliminary results of evaluating SAAM-BLP algorithms demonstrate a 15% increase in the number of authorization requests that can be served without consulting access control policies.

Tags
Data and Resources
To access the resources you must log in

This item has no data

Identity

Description: The Identity category includes attributes that support the identification of the resource.

Field Value
PID https://www.doi.org/10.5281/zenodo.3264261
PID https://www.doi.org/10.5281/zenodo.3264260
URL http://dx.doi.org/10.5281/zenodo.3264261
URL https://figshare.com/articles/The_Secondary_and_Approximate_Authorization_Model_and_its_Application_to_BellLaPadula_Policies/8428511
URL http://dx.doi.org/10.5281/zenodo.3264260
URL https://zenodo.org/record/3264261
Access Modality

Description: The Access Modality category includes attributes that report the modality of exploitation of the resource.

Field Value
Access Right Open Access
Attribution

Description: Authorships and contributors

Field Value
Author Beznosov, Konstantin
Publishing

Description: Attributes about the publishing venue (e.g. journal) and deposit location (e.g. repository)

Field Value
Collected From figshare; Datacite; FigShare
Hosted By Zenodo; figshare; FigShare
Publication Date 2006-10-18
Additional Info
Field Value
Language UNKNOWN
Resource Type Other literature type; Conference object
system:type publication
Management Info
Field Value
Source https://science-innovation-policy.openaire.eu/search/publication?articleId=dedup_wf_001::86871fe098580bf066c6159ee674c8e7
Author jsonws_user
Last Updated 22 December 2020, 18:25 (CET)
Created 22 December 2020, 18:25 (CET)