{"id":"https://openalex.org/W2111886563","doi":"https://doi.org/10.1145/2613087.2613096","title":"Hardware-enhanced distributed access enforcement for role-based access control","display_name":"Hardware-enhanced distributed access enforcement for role-based access control","publication_year":2014,"publication_date":"2014-06-25","ids":{"openalex":"https://openalex.org/W2111886563","doi":"https://doi.org/10.1145/2613087.2613096","mag":"2111886563"},"language":"en","primary_location":{"id":"doi:10.1145/2613087.2613096","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087.2613096","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055170166","display_name":"Gedare Bloom","orcid":"https://orcid.org/0000-0002-5677-7092"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gedare Bloom","raw_affiliation_strings":["George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085312107","display_name":"Rahul Simha","orcid":"https://orcid.org/0000-0002-0689-9411"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul Simha","raw_affiliation_strings":["George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055170166"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17091396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"5","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.82017582654953},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.78229820728302},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.760496973991394},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6029961705207825},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5490217804908752},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5035666823387146},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.49694207310676575},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4889315664768219},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.47298893332481384},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4568652808666229},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4480047821998596},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4393799304962158},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.41653239727020264},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3604786992073059},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34735679626464844},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20969638228416443},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1732645332813263},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.07153075933456421}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82017582654953},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.78229820728302},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.760496973991394},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6029961705207825},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5490217804908752},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5035666823387146},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.49694207310676575},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4889315664768219},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.47298893332481384},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4568652808666229},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4480047821998596},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4393799304962158},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.41653239727020264},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3604786992073059},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34735679626464844},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20969638228416443},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1732645332813263},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.07153075933456421},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2613087.2613096","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087.2613096","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.571.10","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.571.10","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.seas.gwu.edu/~simha/research/sacmat14.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[{"id":"https://openalex.org/G1746851555","display_name":null,"funder_award_id":"CNS-0934725","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W100509257","https://openalex.org/W255507537","https://openalex.org/W1973954799","https://openalex.org/W1978526536","https://openalex.org/W2002604183","https://openalex.org/W2003748004","https://openalex.org/W2041300124","https://openalex.org/W2047111620","https://openalex.org/W2062143991","https://openalex.org/W2065076704","https://openalex.org/W2065483852","https://openalex.org/W2095881341","https://openalex.org/W2112053513","https://openalex.org/W2112104352","https://openalex.org/W2113851063","https://openalex.org/W2138798600","https://openalex.org/W2139287545","https://openalex.org/W2145793726","https://openalex.org/W2147657366","https://openalex.org/W2149207009","https://openalex.org/W2166602595","https://openalex.org/W2167911131","https://openalex.org/W2268596041","https://openalex.org/W2582422377","https://openalex.org/W3102845218"],"related_works":["https://openalex.org/W2148952798","https://openalex.org/W1596015467","https://openalex.org/W2094052616","https://openalex.org/W2004519898","https://openalex.org/W4255992492","https://openalex.org/W2106208683","https://openalex.org/W2374393728","https://openalex.org/W2382286253","https://openalex.org/W2362551446","https://openalex.org/W1606009861"],"abstract_inverted_index":{"The":[0],"protection":[1],"of":[2,18,193],"information":[3],"in":[4,87],"enterprise":[5],"and":[6,13,115,134,137],"cloud":[7],"platforms":[8],"is":[9],"growing":[10],"more":[11],"important":[12],"complex":[14],"with":[15,25],"increasing":[16],"numbers":[17],"users":[19],"who":[20],"need":[21],"to":[22,72,84,141,160,167,184,189],"access":[23,29,37,49,58,73,110,129,144,169,182,194],"resources":[24],"distinct":[26],"permissions.":[27],"Role-based":[28],"control":[30],"(RBAC)":[31],"eases":[32],"administrative":[33],"complexity":[34],"for":[35,105,131],"large-scale":[36],"control,":[38,111],"while":[39,163],"a":[40,69,88,157],"client-server":[41],"model":[42],"can":[43],"ease":[44],"performance":[45,166],"bottlenecks":[46],"by":[47,155],"distributing":[48],"enforcement":[50,74,130,183,195],"across":[51],"multiple":[52],"servers":[53,196],"that":[54,98,174],"consult":[55],"the":[56,149,191],"centralized":[57],"decision":[59],"policy":[60],"server":[61],"as":[62,103],"needed.":[63],"In":[64],"this":[65],"paper,":[66],"we":[67,135],"propose":[68],"new":[70,139],"approach":[71,95],"using":[75,91,177],"an":[76],"existing":[77,161],"associative":[78],"array":[79],"hardware":[80,97],"data":[81,147],"structure":[82],"(HWDS)":[83],"cache":[85],"authorizations":[86],"distributed":[89,128,175],"system":[90],"RBAC.":[92],"This":[93],"HWDS":[94,150],"uses":[96],"has":[99],"previous":[100],"been":[101],"demonstrated":[102],"useful":[104],"several":[106],"application":[107],"domains":[108],"including":[109],"network":[112],"packet":[113],"routing,":[114],"generic":[116],"comparison-based":[117],"integer":[118],"search":[119],"algorithms.":[120],"We":[121],"reproduce":[122],"experiments":[123,140],"from":[124],"prior":[125],"work":[126],"on":[127],"RBAC":[132,178],"systems,":[133],"design":[136],"conduct":[138],"evaluate":[142],"HWDS-based":[143,181],"enforcement.":[145],"Experimental":[146],"show":[148],"cuts":[151],"session":[152,186],"initiation":[153],"time":[154],"about":[156],"third":[158],"compared":[159],"solutions,":[162],"achieving":[164],"similar":[165],"authorize":[168],"requests.":[170],"These":[171],"results":[172],"suggest":[173],"systems":[176],"could":[179],"use":[180],"increase":[185],"throughput":[187],"or":[188],"decrease":[190],"number":[192],"without":[197],"losing":[198],"performance.":[199]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
