A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation
MetadataShow full item record
We consider the distributed access enforcement problem for Role-Based Access Control (RBAC) systems. Such enforcement has become important with RBAC's increasing adoption, and the proliferation of data that needs to be protected. We provide a platform for assessing candidates for access enforcement in a distributed architecture for enforcement. The platform provides the ability to encode data structures and algorithms for enforcement, and to measure time-, space- and administrative efficiency. To validate our platform, we use it to compare the state of the art in enforcement, CPOL , with two other approaches, the directed graph and the access matrix [9, 10]. We consider encodings of RBAC sessions in each, and propose and justify a benchmark for the assessment. We conclude with the somewhat surprising observation that CPOL is not necessarily the most efficient approach for access enforcement in distributed RBAC deployments.
Cite this work
Marko Komlenovic (2011). A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation. UWSpace. http://hdl.handle.net/10012/5731
Showing items related by title, author, creator and subject.
Medium Access Control, Packet Routing, and Internet Gateway Placement in Vehicular Ad Hoc Networks Omar, Hassan Aboubakr (University of Waterloo, 2014-04-10)Road accidents represent a serious social problem and are one of the leading causes of human death and disability on a global scale. To reduce the risk and severity of a road accident, a variety of new safety applications ...
Angel, Jason (University of Waterloo, 2016-02-23)This study examined how a quality management system, which includes a crowdsourcing application, could improve accessibility. As a result this research captured the interactions a person with impairment has with the built ...
Mousavi, Nima (University of Waterloo, 2014-03-31)Access control is used to provide regulated access to resources by principals. It is an important and foundational aspect of information security. Role-Based Access Control (RBAC) is a popular and widely-used access ...