A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Flooding and recycling authorizations
2005
Proceedings of the 2005 workshop on New security paradigms - NSPW '05
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers through remote procedure calls. In massive-scale and complex enterprises, PTP authorization architectures result in fragile and inefficient solutions. They also fail to exploit virtually free CPU resources and network bandwidth. This paper proposes leveraging publishsubscribe architectures for
doi:10.1145/1146269.1146285
dblp:conf/nspw/Beznosov05
fatcat:kon3vrjusrcfxi37myigt35yia