• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2025, Vol. 47 ›› Issue (12): 2169-2180.

• Computer Network and Znformation Security • Previous Articles     Next Articles

Evaluation of attribute access control policy integrating clustering and structural optimization

XIA Tong,YUAN Lingyun,XIE Tianyu   

  1. (1.School of Information Science and Technology,Yunnan Normal University,Kunming 650500;
    2.Key Laboratory of Educational Information for Nationalities,
    Ministry of Education,Yunnan Normal University,Kunming 650500,China)
  • Received:2024-01-18 Revised:2024-08-05 Online:2025-12-25 Published:2026-01-06

Abstract: To accelerate the response speed for user requests to access resources, this paper proposes an evaluation method for attribute-based access control policies that integrates clustering and structural optimization. Firstly, a rule distance weight matrix is constructed to calculate the actual distances between non-numeric rule data points. Secondly,  large-scale policy sets are processed using the CKmeans (canopy k-means) two-stage clustering method, dividing it into several small-scale policy clusters to reduce the scope of policy matching. Finally, based on a rule structure optimization and integration approach, the number of rule entries within clusters is compressed, minimizing the number of comparisons between access requests and cluster rules, and a hash cache table is introduced to expedite access for repeated requests. The effectiveness of the proposed method is validated using multiple XACML (extensible access control markup language) access control policies from real-world systems. Experimental results demonstrate that, compared to existing evaluation engines such as Sun’s XACML and Xengine, as well as four types of machine learning methods, the proposed method significantly reduces time overhead across three policy sets—LMS, VMS, and ASMS—with a maximum reduction of approximately three orders of magnitude, greatly enhancing policy evaluation efficiency.


Key words: authorized access control, policy evaluation, two-stage clustering, rule structural optimization, hash caching