Skip to main content

A Survey of Techniques for the Representation of Very Large Access Control Matrices

  • Conference paper
  • First Online:
Book cover Frontier Computing (FC 2016)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 422))

Included in the following conference series:

  • 1246 Accesses

Abstract

In industry, the efficiency of access control has become the bottleneck of many very large data management systems; however, little work has been done to develop an effective and efficient representation of access control data. We survey a number of relevant techniques, including several sparse matrix compression schemes and bitmap compression schemes. All these techniques can be potentially used to represent very large access control matrices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anh, V.N., Moffat, A.: Index compression using fixed binary codewords. In: Proceedings of the Fifteenth Australian Database Conference. pp. 61–67. Australian Computer Society, Dunedin, New Zealand (2004)

    Google Scholar 

  2. Anh, V.N., Moffat, A.: Inverted index compression using word-aligned binary codes. Inf. Retr. 8(1), 151–166 (2005)

    Article  Google Scholar 

  3. Antoshenkov, G., Ziauddin, M.: Query processing and optimization in Oracle Rdb. VLDB J. 5(4), 229–237 (1996)

    Article  Google Scholar 

  4. Croft, W., Metzler, D., Strohman, T.: Search Engines: Information Retrieval in Practice. Addison Wesley Publishing Company Incorporated (2010), http://books.google.ca/books?id=VVYAPgAACAAJ

  5. Golub, G., Van Loan, C.: Matrix Computations. Johns Hopkins Studies in the Mathematical Sciences, Johns Hopkins University Press (2012), http://books.google.ca/books?id=X5YfsuCWpxMC

  6. Gottschling, P., Lindbo, D.: Generic compressed sparse matrix insertion: Algorithms and implementations in MTL4 and FEniCS. In: Proceedings of the 8th Workshop on Parallel/High-Performance Object-Oriented Scientific Computing. pp. 2:1–2:8. ACM, Genova, Italy (2009), http://doi.acm.org/10.1145/1595655.1595657

  7. Inc., A.C.: Understanding packbits. http://devword.apple.com/technotes/tn/tn1023.html (1996)

  8. Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems. pp. 437–443. Prinston University, Prinston, NJ, USA (1971)

    Google Scholar 

  9. Nelson, M., Gailly, J.L.: The Data Compression Book (2nd ed.). MIS:Press, New York, NY, USA (1996)

    Google Scholar 

  10. Wei, X., Luo, X., Q.Li, Zhang, J., Xu, Z.: Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map. IEEE Transactions on Fuzzy Systems. 23(1), 72–84 (2015)

    Article  Google Scholar 

  11. Wu, K., Otoo, E.J., Shoshani, A.: A performance comparison of bitmap indexes. In: Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management. pp. 559–561. ACM, Atlanta, Georgia, USA (2001)

    Google Scholar 

  12. Wu, K., Otoo, E.J., Shoshani, A., Nordbergi, H.: Notes on design and implementation of compressed bit vectors. Tech. Rep. LBNL/PUB-3161, Lawrence Berkeley National Laboratory, Berkeley, CA (2001)

    Google Scholar 

  13. Xu, Z., Mei, L., Liu, Y., Hu, C., Chen, L.: Semantic enhanced cloud environment for surveillance data management using video structural description. Computing 98(1–2), 35–54 (2016), http://dx.doi.org/10.1007/s00607-014-0408-7

  14. Zhang, J., Long, X., Suel, T.: Performance of compressed inverted list caching in search engines. In: Proceedings of the 17th International Conference on World Wide Web. pp. 387–396. ACM, Beijing, China (2008)

    Google Scholar 

  15. Zukowski, M., Héman, S., Nes, N., Boncz, P.A.: Super-scalar RAM-CPU cache compression. In: Proceedings of the 22nd International Conference on Data Engineering. pp. 59–70. IEEE Computer Society, Atlanta, GA, USA (2006)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Canada NSERC Business Intelligence Network and by the University of Waterloo, in part by the National Science and Technology Major Project under Grant 2013ZX01033002-003, in part by the National High Technology Research and Development Program of China (863 Program) under Grant 2013AA014601, in part by the National Science Foundation of China under Grants 61300028, in part by the Project of the Ministry of Public Security under Grant 2014JSYJB009.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junyi Gu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Wu, G.Z., Gu, J., Dai, J. (2018). A Survey of Techniques for the Representation of Very Large Access Control Matrices. In: Yen, N., Hung, J. (eds) Frontier Computing. FC 2016. Lecture Notes in Electrical Engineering, vol 422. Springer, Singapore. https://doi.org/10.1007/978-981-10-3187-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3187-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3186-1

  • Online ISBN: 978-981-10-3187-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics