Flooding and recycling authorizations

Konstantin (Kosta) Beznosov
2005 Proceedings of the 2005 workshop on New security paradigms - NSPW '05  
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. In massive-scale and complex enterprises, PTP authorization architectures result in fragile and inefficient solutions. They also fail to exploit virtually free CPU resources and network bandwidth. This paper proposes leveraging publishsubscribe architectures for
more » ... d reliability and efficiency by flooding delivery channels with speculatively precomputed authorizations and actively recycling them on a just-in-time basis.
doi:10.1145/1146269.1146285 dblp:conf/nspw/Beznosov05 fatcat:kon3vrjusrcfxi37myigt35yia