Skip to main navigation Skip to search Skip to main content

Core role-based access control: Efficient implementations by transformations

  • Yanhong A. Liu
  • , Chen Wang
  • , Michael Gorbovitski
  • , Tom Rothamel
  • , Yongxi Cheng
  • , Yingchao Zhao
  • , Jing Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

This paper describes a transformational method applied to the core component of role-based access control (RBAC), to derive efficient implementations from a specification based on the ANSI standard for RBAC. The method is based on the idea of incrementally maintaining the result of expensive set operations, where a new method is described and used for systematically deriving incrementalization rules. We calculate precise complexities for three variants of efficient implementations as well as for a straightforward implementation based on the specification. We describe successful prototypes and experiments for the efficient implementations and for automatically generating efficient implementations from straightforward implementations.

Original languageEnglish
Title of host publicationPEPM 2006
Subtitle of host publicationProceedings of the Workshop on Partial Evaluation and Program Manipulation
Pages112-120
Number of pages9
DOIs
StatePublished - 2006
Event2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation - Charleston, SC, United States
Duration: Jan 9 2006Jan 10 2006

Publication series

NameProceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation

Conference

Conference2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation
Country/TerritoryUnited States
CityCharleston, SC
Period01/9/0601/10/06

Keywords

  • Access control
  • Complexity guarantees
  • Incrementalization
  • Optimization
  • Transformation

Fingerprint

Dive into the research topics of 'Core role-based access control: Efficient implementations by transformations'. Together they form a unique fingerprint.

Cite this