11 items found

Tags: SAAM

Filter Results
  • publication

    Cooperative Secondary Authorization Recycling

    As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the...
  • publication

    Secondary and Approximate Authorization Model (SAAM) and its Application to B...

    The talk defines the secondary and approximate authorization model (SAAM). In SAAM, approximate authorization responses are inferred from cached primary responses, and therefore...
  • publication

    Authorization Using the Publish-Subscribe Model

    Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers....
  • publication

    Authorization Recycling in RBAC Systems

    As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this...
  • publication

    Employing Secondary and Approximate Authorizations to Improve Access Control ...

    The request-response paradigm used for developing access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining...
  • publication

    The Secondary and Approximate Authorization Model and its Application to BLP ...

    The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from...
  • publication

    Toward Improving Availability and Performance of Enterprise Authorization Ser...

    In currently deployed large enterprise systems, policy enforcement points (PDPs) are commonly implemented as logically centralized authorization servers. This centralization...
  • publication

    dedup_wf_001--41931868b6ff1eacb7946a7710874cfe

    The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining...
  • publication

    dedup_wf_001--50111f5ad89a5b5255b25f874e839176

    The way security mechanisms for distributed applications are engineered today has a number of serious drawbacks. As a result, secure distributed applications are (a) very...
  • publication

    dedup_wf_001--86871fe098580bf066c6159ee674c8e7

    The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from...
  • publication

    Flooding and Recycling Authorizations

    The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the...