The Community for Technology Leaders
Computer Security Applications Conference, Annual (2008)
Dec. 8, 2008 to Dec. 12, 2008
ISSN: 1063-9527
ISBN: 978-0-7695-3447-3
pp: 153-162
Users expect that systems react instantly. This is specifically the case for user-centric workflows in business process-driven environments. In today's enterprise systems most actions executed by a user have to be checked against the system's access control policy and require a call to the access control component. Hence, improving the performance of access control decisions will improve the overall performance experienced by the end user significantly. In this paper we propose a caching strategy which pre-computes caching entries by exploiting the fact that the executions of business processes are based on the execution of actions in a predefined order. We propose an accompanying architecture and present the results of our conducted benchmark.
Access Control, Business Process, Caching, Workflow

A. Schaad and M. Kohler, "ProActive Access Control for Business Process-Driven Environments," 2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC), Hsinchu, 2008, pp. 153-162.
95 ms
(Ver 3.3 (11022016))