000000045 001__ 45
000000045 005__ 20130522141954.0
000000045 037__ $$aLERSSE-PRESENTATION-2005-018
000000045 041__ $$aeng
000000045 100__ $$aKonstantin Beznosov
000000045 245__ $$aFlooding and Recycling Authorizations
000000045 260__ $$c2005-10-16
000000045 520__ $$aThe request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. In massive-scale and complex enterprises, PTP authorization architectures result in fragile and sub-efficient solutions. The architectures also fail to exploit virtually free CPU resources and network bandwidth. This paper proposes to leverage publish-subscribe architectures for increasing failure resilience and efficiency by flooding delivery channels with speculatively pre-computed authorizations and recycling them on just-in-time basis.
000000045 6531_ $$aJAMES
000000045 6531_ $$aauthorization recycling
000000045 6531_ $$aauthorization flooding
000000045 6531_ $$aaccess control
000000045 6531_ $$aauthorization
000000045 6531_ $$aEngineering Security Mechanisms
000000045 8560_ $$fqiangw@ece.ubc.ca
000000045 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/45/files/45.pdf$$yTransfer from CDS 0.99.7
000000045 909C4 $$pKonstantin Beznosov, "Flooding and Recycling	Authorizations," presentation given at the New Security Paradigms Workshop	(NSPW), Lake Arrowhead, CA, USA, 22 September, 2005, pp.25. 
000000045 980__ $$aPRESENTATION