Research Article
Authorization Recycling in Attribute-Based Access Control
Algorithm 3
Cache construction algorithm for ABAC(H) model.
Input: ; response | Output: | 1: AddResponse() | 2: ifthen | 3: add to ; | 4: else ifthen | 5: if the record of w.r.t. permission is empty then | 6: add to ; | 7: else // | 8: ; | 9: end if | 10: else // | 11: ifthen | 12: if the record of w.r.t. permission is empty then | 13: add to ; | 14: else // | 15: if and then | 16: ; | 17: else if and then | 18: ; | 19: else if and then | 20: ; | 21: else; | 22: end if | 23: end if | 24: else ifthen | 25: Step1: // update | 26: if the record of w.r.t. permission is empty then | 27: add to ; | 28: else // | 29: ifthen | 30: ; | 31: else; | 32: end if | 33: end if | 34: Step2: // update | 35: if the record of w.r.t. permission is empty then | 36: add to ; | 37: else; | 38: end if | 39: else ifthen | 40: Step: // update | 41: if the record of w.r.t. permission is empty then | 42: add to ; | 43: else // | 44: ifthen | 45: ; | 46: else; | 47: end if | 48: end if | 49: Step: // update | 50: if the record of w.r.t. permission is empty then | 51: add to ; | 52: else; | 53: end if | 54: else if the subject’s attributes meet and the object’s attributes meet then | 55: goto Step; | 56: else the subject’s attributes meet and the object’s attributes meet | 57: goto Step2; | 58: end if | 59: end if |
|