Abstract
In industry, the efficiency of access control has become the bottleneck of many very large data management systems; however, little work has been done to develop an effective and efficient representation of access control data. We survey a number of relevant techniques, including several sparse matrix compression schemes and bitmap compression schemes. All these techniques can be potentially used to represent very large access control matrices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anh, V.N., Moffat, A.: Index compression using fixed binary codewords. In: Proceedings of the Fifteenth Australian Database Conference. pp. 61–67. Australian Computer Society, Dunedin, New Zealand (2004)
Anh, V.N., Moffat, A.: Inverted index compression using word-aligned binary codes. Inf. Retr. 8(1), 151–166 (2005)
Antoshenkov, G., Ziauddin, M.: Query processing and optimization in Oracle Rdb. VLDB J. 5(4), 229–237 (1996)
Croft, W., Metzler, D., Strohman, T.: Search Engines: Information Retrieval in Practice. Addison Wesley Publishing Company Incorporated (2010), http://books.google.ca/books?id=VVYAPgAACAAJ
Golub, G., Van Loan, C.: Matrix Computations. Johns Hopkins Studies in the Mathematical Sciences, Johns Hopkins University Press (2012), http://books.google.ca/books?id=X5YfsuCWpxMC
Gottschling, P., Lindbo, D.: Generic compressed sparse matrix insertion: Algorithms and implementations in MTL4 and FEniCS. In: Proceedings of the 8th Workshop on Parallel/High-Performance Object-Oriented Scientific Computing. pp. 2:1–2:8. ACM, Genova, Italy (2009), http://doi.acm.org/10.1145/1595655.1595657
Inc., A.C.: Understanding packbits. http://devword.apple.com/technotes/tn/tn1023.html (1996)
Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems. pp. 437–443. Prinston University, Prinston, NJ, USA (1971)
Nelson, M., Gailly, J.L.: The Data Compression Book (2nd ed.). MIS:Press, New York, NY, USA (1996)
Wei, X., Luo, X., Q.Li, Zhang, J., Xu, Z.: Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map. IEEE Transactions on Fuzzy Systems. 23(1), 72–84 (2015)
Wu, K., Otoo, E.J., Shoshani, A.: A performance comparison of bitmap indexes. In: Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management. pp. 559–561. ACM, Atlanta, Georgia, USA (2001)
Wu, K., Otoo, E.J., Shoshani, A., Nordbergi, H.: Notes on design and implementation of compressed bit vectors. Tech. Rep. LBNL/PUB-3161, Lawrence Berkeley National Laboratory, Berkeley, CA (2001)
Xu, Z., Mei, L., Liu, Y., Hu, C., Chen, L.: Semantic enhanced cloud environment for surveillance data management using video structural description. Computing 98(1–2), 35–54 (2016), http://dx.doi.org/10.1007/s00607-014-0408-7
Zhang, J., Long, X., Suel, T.: Performance of compressed inverted list caching in search engines. In: Proceedings of the 17th International Conference on World Wide Web. pp. 387–396. ACM, Beijing, China (2008)
Zukowski, M., Héman, S., Nes, N., Boncz, P.A.: Super-scalar RAM-CPU cache compression. In: Proceedings of the 22nd International Conference on Data Engineering. pp. 59–70. IEEE Computer Society, Atlanta, GA, USA (2006)
Acknowledgements
This work was supported in part by the Canada NSERC Business Intelligence Network and by the University of Waterloo, in part by the National Science and Technology Major Project under Grant 2013ZX01033002-003, in part by the National High Technology Research and Development Program of China (863 Program) under Grant 2013AA014601, in part by the National Science Foundation of China under Grants 61300028, in part by the Project of the Ministry of Public Security under Grant 2014JSYJB009.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, G.Z., Gu, J., Dai, J. (2018). A Survey of Techniques for the Representation of Very Large Access Control Matrices. In: Yen, N., Hung, J. (eds) Frontier Computing. FC 2016. Lecture Notes in Electrical Engineering, vol 422. Springer, Singapore. https://doi.org/10.1007/978-981-10-3187-8_8
Download citation
DOI: https://doi.org/10.1007/978-981-10-3187-8_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3186-1
Online ISBN: 978-981-10-3187-8
eBook Packages: EngineeringEngineering (R0)