DocumentCode
2347730
Title
Fast control in object-oriented repetitive access
Author
Shaohua Deng, Peter
Author_Institution
Central Police Univ., Taoyuan, Taiwan
fYear
1994
fDate
12-14 Oct 1994
Firstpage
173
Lastpage
175
Abstract
In a repetitive transaction object-oriented system, a trade-off for an access control mechanism is accomplished in satisfying both the requirements of user friendliness and system performance. Since access control in object-oriented systems is applied to individual methods of individual objects, hence the overhead is extremely large because a check is done on every method invocation. To properly solve the two requirements above, we present a design with the following main features : (1) the whole environment is a central controlled, opened, object-oriented system with discretionary access control, and is trying to satisfy both hierarchical and non-hierarchical control requirements. (2) a rule-based method is provided for user to describe their access control policies (3). After a series of transformation and optimization processes, the access control policies are translated into access control list table with one to one mapping between resource object id´s and user id´s. (4) finally, because an ACL table is maintained in main memory for each user who repetitively use resource objects in the system, there is only zero or one disk access needed per one access authorization check. A theoretical analysis of the time complexity of this design has been made, and we have implemented it by using high speed workstation, UNIX, C++ and C-ISAM
Keywords
authorisation; computational complexity; object-oriented programming; optimisation; transaction processing; ACL table; C++; C-ISAM; UNIX; access control; access control mechanism; high speed workstation; object-oriented repetitive access; resource objects; rule-based method; system performance; time complexity; transaction object-oriented system; user friendliness; Complexity theory; Microcomputer interfaces, human factors; Object-oriented programming; Optimization methods;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on
Conference_Location
Albuquerque, NM
Print_ISBN
0-7803-1479-4
Type
conf
DOI
10.1109/CCST.1994.363772
Filename
363772
Link To Document