000000003 001__ 3
000000003 005__ 20130522141943.0
000000003 037__ $$aTEST-ARTICLE-2005-003
000000003 041__ $$aeng
000000003 100__ $$aKonstantin Beznosov
000000003 245__ $$aFlooding and Recycling Authorizations
000000003 260__ $$c2005-10-11
000000003 300__ $$a10p
000000003 520__ $$aThe request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. In massive-scale and complex enterprises, PTP authorization architectures result in fragile and subefficient solutions. The architectures also fail to exploit virtually free CPU resources and network bandwidth. This paper proposes to leverage publish-subscribe architectures for increasing failure resilience and efficiency by flooding delivery channels with speculatively pre-computed authorizations and recycling them on just-in-time basis.
000000003 6531_ $$aJAMES
000000003 6531_ $$aSAAM
000000003 6531_ $$aCSAR
000000003 6531_ $$aauthorization recycling
000000003 6531_ $$aauthorization flooding
000000003 6531_ $$aaccess control
000000003 6531_ $$aauthorization
000000003 8560_ $$fqiangw@ece.ubc.ca
000000003 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/3/files/3.pdf$$yTransfer from CDS 0.99.7
000000003 909C4 $$pKonstantin Beznosov, "Flooding and Recycling Authorizations", in Proceedings of New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, ACM, 20-23 September, 2005, pp.67-72.
000000003 980__ $$aRefConfPaper