{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:31:38Z","timestamp":1740133898974,"version":"3.37.3"},"reference-count":28,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01n02","funder":[{"name":"The science research plan project of education department of Shaanxi Province","award":["18JK0507"],"award-info":[{"award-number":["18JK0507"]}]},{"name":"The natural science foundation of Shaanxi province in China","award":["2019JM-020"],"award-info":[{"award-number":["2019JM-020"]}]},{"name":"The natural science foundation of Shaanxi province in China","award":["2019JM-162"],"award-info":[{"award-number":["2019JM-162"]}]},{"DOI":"10.13039\/501100001809","name":"The national natural science foundation of China","doi-asserted-by":"crossref","award":["61702408"],"award-info":[{"award-number":["61702408"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2020,3]]},"abstract":"<jats:p> EXtensible Access Control Markup Language (XACML) is one of the standardized languages for specifying access control policies. Policies described by the XACML are used to express the security requirement in the network and information system when we study authorization access control. With the aim to improve the Policy Decision Point (PDP) evaluation performance, we put forward a Graph and Clustering-Based Framework, employing the aggregate function. First, we partition the rule set into subsets. For the single value, we select the best partition quantity based on the aggregate function. As for the interval value, we handle with the start point and the finish point, respectively, in the same way as single value. Second, the policy set is split according to the partition of rule set. In this way, not only single values, but also interval values are taken into consideration. After that, we explore the searching tree to obtain the possibly matched rules. Finally, we construct the combining tree and output the policy decision on the basis of it. The experimental results show that our approach is orders of magnitude better than the Sun PDP. A comparison in evaluation performance between the redundancy detecting and eliminating engine and the Sun PDP, as well as XEngine and SBA-XACML, is made. Experimental results show that the evaluation performance of the PDP can be prominently improved by eliminating redundancies. <\/jats:p>","DOI":"10.1142\/s0218843020400018","type":"journal-article","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T03:38:22Z","timestamp":1575949102000},"page":"2040001","source":"Crossref","is-referenced-by-count":1,"title":["A Graph and Clustering-Based Framework for Efficient XACML Policy Evaluation"],"prefix":"10.1142","volume":"29","author":[{"given":"Yanfei","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Technology, Luoyang Normal University, Luoyang 471934, P. R. China"}]},{"given":"Fan","family":"Deng","sequence":"additional","affiliation":[{"name":"Institute of Systems Security and Control, School of Computer Science and Technology, Xi\u2019an University of Science and Technology, Xi\u2019an 710054, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2020,2,20]]},"reference":[{"key":"S0218843020400018BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/RSM.2011.6088362"},{"key":"S0218843020400018BIB002","first-page":"202","volume":"30","author":"Angulo P.","year":"2017","journal-title":"Int. J. Comput. Integra. Manuf."},{"key":"S0218843020400018BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.115"},{"key":"S0218843020400018BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2018.7511255"},{"key":"S0218843020400018BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.80"},{"key":"S0218843020400018BIB006","first-page":"255","volume":"4","author":"Kuang T. P.","year":"2018","journal-title":"J. Adv. Comput. Engi. Technol."},{"key":"S0218843020400018BIB007","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6394253"},{"key":"S0218843020400018BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890936"},{"key":"S0218843020400018BIB012","first-page":"83","volume-title":"Proc. the 17th ACM Symp. Access Control Models and Technologies","author":"Ros S. P.","year":"2012"},{"key":"S0218843020400018BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.12.012"},{"key":"S0218843020400018BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2013.6627838"},{"key":"S0218843020400018BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.001"},{"key":"S0218843020400018BIB016","first-page":"955","volume":"49","author":"Yahlaoui M.","year":"2013","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"S0218843020400018BIB017","first-page":"1","volume":"2","author":"Deng F.","year":"2014","journal-title":"Math. Probl. Eng."},{"key":"S0218843020400018BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.36"},{"key":"S0218843020400018BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.274"},{"key":"S0218843020400018BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.18"},{"key":"S0218843020400018BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.003"},{"key":"S0218843020400018BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0588-8"},{"key":"S0218843020400018BIB023","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.03.015"},{"key":"S0218843020400018BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.121"},{"key":"S0218843020400018BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2012.6158775"},{"key":"S0218843020400018BIB027","first-page":"238","volume-title":"Proc. Int. Conf. Software Testing, Verification, and Validation","author":"Pretschner A.","year":"2008"},{"key":"S0218843020400018BIB028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_38"},{"key":"S0218843020400018BIB029","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.49"},{"key":"S0218843020400018BIB030","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.031"},{"key":"S0218843020400018BIB031","first-page":"1405","volume-title":"Proc. 2012 Int. Conf. Computer Science and Service System (CSSS)","author":"Ni D.","year":"2012"},{"key":"S0218843020400018BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2011.6139111"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843020400018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T02:12:29Z","timestamp":1593051149000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218843020400018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,20]]},"references-count":28,"journal-issue":{"issue":"01n02","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["10.1142\/S0218843020400018"],"URL":"https:\/\/doi.org\/10.1142\/s0218843020400018","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"type":"print","value":"0218-8430"},{"type":"electronic","value":"1793-6365"}],"subject":[],"published":{"date-parts":[[2020,2,20]]}}}