Research Article

Authorization Recycling in Attribute-Based Access Control

Table 1

Comparison of different approaches.

SchemePolicy expressionGranularityAuthorization recyclingApplication scenario

Reference [5]FlexibilityFine grainedNoSpecific application
Reference [9]FlexibilityFine grainedNoGeneral purpose
Reference [15]ā€”ā€”YesGeneral purpose
OursFlexibilityFine grainedYesGeneral purpose