Research Article

Authorization Recycling in Attribute-Based Access Control

Algorithm 3

Cache construction algorithm for ABAC(H) model.
Input: ; response
Output:
1: AddResponse()
2: ifthen
3: add to ;
4: else ifthen
5: if the record of w.r.t. permission is empty then
6:  add to ;
7: else //
8:  ;
9: end if
10: else //
11: ifthen
12:  if the record of w.r.t. permission is empty then
13:   add to ;
14:  else //
15:   if and then
16:    ;
17:   else if and then
18:    ;
19:   else if and then
20:    ;
21:   else;
22:   end if
23:  end if
24: else ifthen
25:  Step1:  // update
26:  if the record of w.r.t. permission is empty then
27:   add to ;
28:  else //
29:   ifthen
30:    ;
31:   else;
32:   end if
33:  end if
34:  Step2: // update
35:  if the record of w.r.t. permission is empty then
36:   add to ;
37:  else;
38:  end if
39: else ifthen
40:  Step:  // update
41:  if the record of w.r.t. permission is empty then
42:   add to ;
43:  else //
44:   ifthen
45:    ;
46:   else;
47:   end if
48:  end if
49:  Step: // update
50:  if the record of w.r.t. permission is empty then
51:   add to ;
52:  else;
53:  end if
54: else if the subject’s attributes meet and the object’s attributes meet then
55:  goto Step;
56: else the subject’s attributes meet and the object’s attributes meet
57:  goto Step2;
58: end if
59: end if