dc.contributor.author | Mousavi, Nima | |
dc.contributor.author | Tripunitara, Mahesh | |
dc.date.accessioned | 2018-11-01 20:51:07 (GMT) | |
dc.date.available | 2018-11-01 20:51:07 (GMT) | |
dc.date.issued | 2019-03-01 | |
dc.identifier.uri | https://dx.doi.org/10.1016/j.cose.2018.09.015 | |
dc.identifier.uri | http://hdl.handle.net/10012/14084 | |
dc.description | The final publication is available at Elsevier via https://dx.doi.org/10.1016/j.cose.2018.09.015 © 2019. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/ | en |
dc.description.abstract | We address access enforcement — the process of determining whether a request for access to a resource by a principal should be granted. While access enforcement is essential to security, it must not unduly impact performance. Consequently, we address the issue of time- and space-efficient access enforcement, and in particular, study a particular data structure, the Cascade Bloom filter, in this context. The Cascade Bloom filter is a generalization of the well-known Bloom filter, which is used for time- and space-efficient membership-checking in a set, while allowing for a non-zero probability of false positives. We consider the problems, in practice, of constructing Bloom, and Cascade Bloom filters, with our particular application, access enforcement, in mind. We identify the computational complexity of the underlying problems, and propose concrete algorithms to construct instances of the data structures. We have implemented our algorithms, and conducted empirical assessments, which also we discuss in this paper. Our code is available for public download. As such, our work is a contribution to efficient access enforcement. | en |
dc.language.iso | en | en |
dc.publisher | Elsevier | en |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Access control | en |
dc.subject | Cascade bloom filter | en |
dc.title | Constructing cascade bloom filters for efficient access enforcement | en |
dc.type | Article | en |
dcterms.bibliographicCitation | Mousavi, N., & Tripunitara, M. (2019). Constructing cascade bloom filters for efficient access enforcement. Computers & Security, 81, 1–14. doi:10.1016/j.cose.2018.09.015 | en |
uws.contributor.affiliation1 | Faculty of Engineering | en |
uws.contributor.affiliation2 | Electrical and Computer Engineering | en |
uws.typeOfResource | Text | en |
uws.typeOfResource | Text | en |
uws.peerReviewStatus | Reviewed | en |
uws.scholarLevel | Faculty | en |