DocumentCode :
2347730
Title :
Fast control in object-oriented repetitive access
Author :
Shaohua Deng, Peter
Author_Institution :
Central Police Univ., Taoyuan, Taiwan
fYear :
1994
fDate :
12-14 Oct 1994
Firstpage :
173
Lastpage :
175
Abstract :
In a repetitive transaction object-oriented system, a trade-off for an access control mechanism is accomplished in satisfying both the requirements of user friendliness and system performance. Since access control in object-oriented systems is applied to individual methods of individual objects, hence the overhead is extremely large because a check is done on every method invocation. To properly solve the two requirements above, we present a design with the following main features : (1) the whole environment is a central controlled, opened, object-oriented system with discretionary access control, and is trying to satisfy both hierarchical and non-hierarchical control requirements. (2) a rule-based method is provided for user to describe their access control policies (3). After a series of transformation and optimization processes, the access control policies are translated into access control list table with one to one mapping between resource object id´s and user id´s. (4) finally, because an ACL table is maintained in main memory for each user who repetitively use resource objects in the system, there is only zero or one disk access needed per one access authorization check. A theoretical analysis of the time complexity of this design has been made, and we have implemented it by using high speed workstation, UNIX, C++ and C-ISAM
Keywords :
authorisation; computational complexity; object-oriented programming; optimisation; transaction processing; ACL table; C++; C-ISAM; UNIX; access control; access control mechanism; high speed workstation; object-oriented repetitive access; resource objects; rule-based method; system performance; time complexity; transaction object-oriented system; user friendliness; Complexity theory; Microcomputer interfaces, human factors; Object-oriented programming; Optimization methods;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on
Conference_Location :
Albuquerque, NM
Print_ISBN :
0-7803-1479-4
Type :
conf
DOI :
10.1109/CCST.1994.363772
Filename :
363772
Link To Document :
بازگشت