We address the distributed setting for enforcement of a centralized Role-Based Access Control (RBAC) protection state. We present a new approach for time- and space-efficient access enforcement. Underlying our approach is a data structure that we call a cas-cade Bloom filter. We describe our approach, provide details about the cascade Bloom filter, its associated algorithms, soundness and completeness properties for those algorithms, and provide an em-pirical validation for distributed access enforcement of RBAC. We demonstrate that even in low-capability devices such as WiFi net-work access points, we can perform thousands of access checks in a second
The enforcement of fine-grained access control policies in constrained dynamic networks can become a...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
This paper proposes a formal approach to security analysis of a RBAC model which specification conta...
The protection of information in enterprise and cloud platforms is growing more important and comple...
Abstract. This paper presents a framework for representing and distributing access control policies ...
This paper presents a framework for representing and distributing access control policies in distrib...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
We present a new access control mechanism for P2P networks with distributed enforcement, called P2P ...
Abstract. Today, databases, especially those serving/connected to the Internet need strong protectio...
Recently, there arose a necessity to distribute computing applications frequently across grids. Ever...
A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, ac...
Large and distributed access control systems are increasingly common, for example in health care. In...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
Cloud systems provide significant benefits by allowing users to store massive amount of data on dema...
The collaboration among different organizations is considered one of the main benefits of moving app...
The enforcement of fine-grained access control policies in constrained dynamic networks can become a...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
This paper proposes a formal approach to security analysis of a RBAC model which specification conta...
The protection of information in enterprise and cloud platforms is growing more important and comple...
Abstract. This paper presents a framework for representing and distributing access control policies ...
This paper presents a framework for representing and distributing access control policies in distrib...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
We present a new access control mechanism for P2P networks with distributed enforcement, called P2P ...
Abstract. Today, databases, especially those serving/connected to the Internet need strong protectio...
Recently, there arose a necessity to distribute computing applications frequently across grids. Ever...
A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, ac...
Large and distributed access control systems are increasingly common, for example in health care. In...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
Cloud systems provide significant benefits by allowing users to store massive amount of data on dema...
The collaboration among different organizations is considered one of the main benefits of moving app...
The enforcement of fine-grained access control policies in constrained dynamic networks can become a...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
This paper proposes a formal approach to security analysis of a RBAC model which specification conta...