Flooding and recycling authorizations

  • Authors:
  • Konstantin (Kosta) Beznosov

  • Affiliations:
  • University of British Columbia, Vancouver, Canada

  • Venue:
  • NSPW '05 Proceedings of the 2005 workshop on New security paradigms
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. In massive-scale and complex enterprises, PTP authorization architectures result in fragile and inefficient solutions. They also fail to exploit virtually free CPU resources and network bandwidth. This paper proposes leveraging publish-subscribe architectures for increased reliability and efficiency by flooding delivery channels with speculatively pre-computed authorizations and actively recycling them on a just-in-time basis.