Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 7608408, 18 pages
http://dx.doi.org/10.1155/2016/7608408
Research Article

Elimination of the Redundancy Related to Combining Algorithms to Improve the PDP Evaluation Performance

1School of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an 710054, China
2School of Software, Xidian University, Xi’an 710071, China
3School of Computer Science and Technology, Xidian University, Xi’an 710071, China

Received 17 December 2015; Revised 6 April 2016; Accepted 20 April 2016

Academic Editor: Veljko Milutinovic

Copyright © 2016 Fan Deng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. F. Faridus, M. H. A. Wahid, N. Sabani et al., “SOA characterization for AND logic operation on SOA based NOLM,” in Proceedings of the IEEE Regional Symposium on Micro and Nanoelectronics (RSM '11), pp. 372–376, Kota Kinabalu, Malaysia, 2011.
  2. Y. Sun, X. Guan, T. Liu, and Y. Qu, “An identity authentication mechanism based on timing covert channel,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '12), pp. 832–836, Liverpool, UK, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Sara, M. Azzam, O. Hadi et al., “New XACML-AspectBPEL approach for composite web services security,” International Journal of Web and Grid Services, vol. 9, no. 2, pp. 127–145, 2013. View at Publisher · View at Google Scholar
  4. L. Griffin, B. Butler, E. de Leastar, B. Jennings, and D. Botvich, “On the performance of access control policy evaluation,” in Proceedings of the IEEE 13th International Symposium on Policies for Distributed Systems and Networks (POLICY '12), pp. 25–32, Chapel Hill, NC, USA, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Zheng, S. Li, and H. Qiu, “Networked coordination-based distributed model predictive control for large-scale system,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 991–998, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah, “First experiences using XACML for access control in distributed systems,” in Proceedings of the ACM Workshop on XML Security, pp. 25–37, ACM, Fairfax, Va, USA, October 2003. View at Publisher · View at Google Scholar
  7. A. Bertolino, S. Daoudagh, F. Lonetti, and E. Marchetti, “XACMUT: XACML 2.0 mutants generator,” in Proceedings of the IEEE 6th International Conference on Software Testing, Verification and Validation Workshops (ICSTW '13), pp. 28–33, IEEE, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Bertolino, F. Lonetti, and E. Marchetti, “Systematic XACML request generation for testing purposes,” in Proceedings of the 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA '10), pp. 3–11, Lille, France, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. M. L. Pardal, M. Harrison, S. E. Sarma, and J. A. Marques, “Performance assessment of XACML authorizations for supply chain traceability web services,” in Proceedings of the 4th International Conference on Computational Aspects of Social Networks (CASoN '12), pp. 378–383, São Carlos, Brazil, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Fatema and D. Chadwick, “Resolving policy conflicts—integrating policies from multiple authors,” in Advanced Information Systems Engineering Workshops: CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16–20, 2014. Proceedings, vol. 178 of Lecture Notes Business Information Processing, pp. 310–321, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar
  11. J. Fong and H. Shiu, “An interpreter approach for exporting relational data into XML documents with structured export markup language,” Journal of Database Management, vol. 23, no. 1, pp. 49–77, 2012. View at Publisher · View at Google Scholar
  12. I.-H. Lim, T. S. Sidhu, M.-S. Choi et al., “Design and implementation of multiagent-based distributed restoration system in Das,” IEEE Transactions on Power Delivery, vol. 28, no. 2, pp. 585–593, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Masi, R. Pugliese, and F. Tiezzi, “Formalisation and implementation of the XACML access control mechanism,” in Engineering Secure Software and Systems, vol. 7159 of Lecture Notes in Computer Science, pp. 60–74, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  14. A. X. Liu, F. Chen, J. Hwang, and T. Xie, “Xengine: a fast and scalable XACML policy evaluation engine,” in Proceedings of the SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '08), pp. 265–276, 2008. View at Publisher · View at Google Scholar
  15. S. Marouf, M. Shehab, A. Squicciarini, and S. Sundareswaran, “Adaptive reordering and clustering based framework for efficient XACML policy evaluation,” IEEE Transactions on Services Computing, vol. 4, no. 4, pp. 300–313, 2012. View at Google Scholar
  16. A. Mourad and H. Jebbaoui, “SBA-XACML: set-based approach providing efficient policy decision process for accessing Web services,” Expert Systems with Applications, vol. 42, no. 1, pp. 165–178, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Jebbaoui, A. Mourad, H. Otrok, and R. Haraty, “Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies,” Computers & Electrical Engineering, vol. 44, pp. 91–103, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. X. Chen and W. Xu, “Study of XACML policy based on description logic,” Computer Engineering, vol. 39, no. 4, pp. 71–74, 2013. View at Google Scholar
  19. X. Lei, J. Liu, J. Xiao, and J. Li, “An improved description method for role access control based on the XACML,” Computer Science, vol. 35, no. 4, pp. 94–104, 2008. View at Google Scholar
  20. E. Martin, “Automated test generation for access control policies,” in Proceedings of the Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications, pp. 752–753, ACM, Portland, Ore, USA, 2006.
  21. T. Scheffler, S. Schindler, and B. Schnor, “Using AOP-based enforcement of prioritised XACML policies for location privacy,” International Journal of Internet Technology and Secured Transactions, vol. 5, no. 1, pp. 84–104, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. Q. Ni, E. Bertino, J. Lobo et al., “Privacy-aware role-based access control,” ACM Transactions on Information and System Security, vol. 13, no. 3, article 24, 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Hu, G.-J. Ahn, and K. Kulkarni, “Discovery and resolution of anomalies in web access control policies,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 6, pp. 341–354, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. C.-M. Dinu, F. Pop, and V. Cristea, “Pattern detection model for monitoring distributed systems,” in Proceedings of the 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC '11), pp. 268–275, Timisoara, Romania, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. A. J. Zhang, C. Ji, and J. Wang, “Security policy conflict detection for distributed system,” Advanced Materials Research, vol. 282-283, pp. 173–176, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Guarnieri, M. A. Neri, E. Magri et al., “On the notion of redundancy in access control policies,” in Proceedings of the 18th ACM Symposium on Access Control Models and Technologies (SACMAT '13), pp. 161–172, Amsterdam, The Netherlands, 2013.
  27. W. H. Chen and N. N. Wang, “Research on XACML policy evaluation optimization technology,” Application Research of Computers, vol. 30, no. 3, p. 70, 2013. View at Google Scholar
  28. A. Pretschner and B. Baudry, “Test-driven assessment of access control in legacy applications,” in Proceedings of the International Conference on Software Testing, Verification, and Validation, pp. 238–247, Lillehammer, Norway, 2008.
  29. T. Mouelhi, F. Fleurey, B. Baudry et al., “A model-based framework for security policy specification, deployment and testing,” in Model Driven Engineering Languages and Systems: 11th International Conference, MoDELS 2008, Toulouse, France, September 28–October 3, 2008. Proceedings, vol. 5301 of Lecture Notes in Computer Science, pp. 537–552, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  30. T. Mouelhi, Y. L. Traon, and B. Baudry, “Transforming and selecting functional test cases for security policy testing,” in Proceedings of the 2nd International Conference on Software Testing, Verification, and Validation (ICST '09), pp. 171–180, Denver, Colo, USA, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. D. El Kateb, T. Mouelhi, Y. Le Traon, J. Hwang, and T. Xie, “Refactoring access control policies for performance improvement,” in Proceedings of the 3rd Joint WOSP/SIPEW International Conference on Performance Engineering (ICPE '12), pp. 323–334, New York, NY, USA, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  32. C. D. P. K. Ramli, H. R. Nielson, and F. Nielson, “The logic of XACML,” Science of Computer Programming, vol. 83, pp. 80–105, 2014. View at Publisher · View at Google Scholar · View at Scopus
  33. N. Dan, S. Huaji, C. Yuan, and G. Jia-Hu, “Attribute based access control (ABAC)-based cross-domain access control in service-oriented architecture (SOA),” in Proceedings of the International Conference on Computer Science and Service System (CSSS '12), pp. 1405–1408, Nanjing, China, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  34. W. She, I.-L. Yen, F. Bastani, B. Tran, and B. Thuraisingham, “Role-based integrated access control and data provenance for SOA based net-centric systems,” in Proceedings of the 6th IEEE International Symposium on Service-Oriented System Engineering (SOSE '11), pp. 225–234, Irvine, Calif, USA, December 2011. View at Publisher · View at Google Scholar · View at Scopus