Show simple item record

dc.contributor.authorMousavi, Nima
dc.contributor.authorTripunitara, Mahesh
dc.date.accessioned2018-11-01 20:51:07 (GMT)
dc.date.available2018-11-01 20:51:07 (GMT)
dc.date.issued2019-03-01
dc.identifier.urihttps://dx.doi.org/10.1016/j.cose.2018.09.015
dc.identifier.urihttp://hdl.handle.net/10012/14084
dc.descriptionThe final publication is available at Elsevier via https://dx.doi.org/10.1016/j.cose.2018.09.015 © 2019. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/en
dc.description.abstractWe address access enforcement — the process of determining whether a request for access to a resource by a principal should be granted. While access enforcement is essential to security, it must not unduly impact performance. Consequently, we address the issue of time- and space-efficient access enforcement, and in particular, study a particular data structure, the Cascade Bloom filter, in this context. The Cascade Bloom filter is a generalization of the well-known Bloom filter, which is used for time- and space-efficient membership-checking in a set, while allowing for a non-zero probability of false positives. We consider the problems, in practice, of constructing Bloom, and Cascade Bloom filters, with our particular application, access enforcement, in mind. We identify the computational complexity of the underlying problems, and propose concrete algorithms to construct instances of the data structures. We have implemented our algorithms, and conducted empirical assessments, which also we discuss in this paper. Our code is available for public download. As such, our work is a contribution to efficient access enforcement.en
dc.language.isoenen
dc.publisherElsevieren
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectAccess controlen
dc.subjectCascade bloom filteren
dc.titleConstructing cascade bloom filters for efficient access enforcementen
dc.typeArticleen
dcterms.bibliographicCitationMousavi, N., & Tripunitara, M. (2019). Constructing cascade bloom filters for efficient access enforcement. Computers & Security, 81, 1–14. doi:10.1016/j.cose.2018.09.015en
uws.contributor.affiliation1Faculty of Engineeringen
uws.contributor.affiliation2Electrical and Computer Engineeringen
uws.typeOfResourceTexten
uws.typeOfResourceTexten
uws.peerReviewStatusRevieweden
uws.scholarLevelFacultyen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International

UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages