• DocumentCode
    2347730
  • Title

    Fast control in object-oriented repetitive access

  • Author

    Shaohua Deng, Peter

  • Author_Institution
    Central Police Univ., Taoyuan, Taiwan
  • fYear
    1994
  • fDate
    12-14 Oct 1994
  • Firstpage
    173
  • Lastpage
    175
  • Abstract
    In a repetitive transaction object-oriented system, a trade-off for an access control mechanism is accomplished in satisfying both the requirements of user friendliness and system performance. Since access control in object-oriented systems is applied to individual methods of individual objects, hence the overhead is extremely large because a check is done on every method invocation. To properly solve the two requirements above, we present a design with the following main features : (1) the whole environment is a central controlled, opened, object-oriented system with discretionary access control, and is trying to satisfy both hierarchical and non-hierarchical control requirements. (2) a rule-based method is provided for user to describe their access control policies (3). After a series of transformation and optimization processes, the access control policies are translated into access control list table with one to one mapping between resource object id´s and user id´s. (4) finally, because an ACL table is maintained in main memory for each user who repetitively use resource objects in the system, there is only zero or one disk access needed per one access authorization check. A theoretical analysis of the time complexity of this design has been made, and we have implemented it by using high speed workstation, UNIX, C++ and C-ISAM
  • Keywords
    authorisation; computational complexity; object-oriented programming; optimisation; transaction processing; ACL table; C++; C-ISAM; UNIX; access control; access control mechanism; high speed workstation; object-oriented repetitive access; resource objects; rule-based method; system performance; time complexity; transaction object-oriented system; user friendliness; Complexity theory; Microcomputer interfaces, human factors; Object-oriented programming; Optimization methods;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on
  • Conference_Location
    Albuquerque, NM
  • Print_ISBN
    0-7803-1479-4
  • Type

    conf

  • DOI
    10.1109/CCST.1994.363772
  • Filename
    363772