원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related works
3. Propdsed approach : Path-based Verification Cache(VC)
3.1. Cache Entry based on Privilege Delegation Path
3.2. Privilege veriflcation procedure
3.3 Consistency of cache entry : delayed revocation check
4. Performance Evaluation
4.1. Elapsed time of privilege verification
5. Conclusion
References
1. Introduction
2. Related works
3. Propdsed approach : Path-based Verification Cache(VC)
3.1. Cache Entry based on Privilege Delegation Path
3.2. Privilege veriflcation procedure
3.3 Consistency of cache entry : delayed revocation check
4. Performance Evaluation
4.1. Elapsed time of privilege verification
5. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보