\relax 
\citation{Xengine}
\citation{Xengine1}
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{2}}
\citation{site}
\@writefile{toc}{\contentsline {section}{\numberline {II}Context/Problem Statement}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {II-A}}Access Control Data Flow Model}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Access Control Request Processing\relax }}{3}}
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
\newlabel{pep-pdp}{{1}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {II-B}}XACML Access Control Policies and Performance Issues}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces XACML Policy Example\relax }}{4}}
\newlabel{figur1}{{2}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {II-C}}Preserving our Access Control Architectural Model}{4}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Entity Diagram of our Access Control Model\relax }}{5}}
\newlabel{model}{{3}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {III}Our Approach to Optimizing Decision Making in XACML}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {III-A}}XACML Policy Refactoring Process}{5}}
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Splitting Criteria\relax }}{5}}
\newlabel{table1}{{I}{5}}
\citation{legacy}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Request processing: (a)-PDP decomposition based on target elements: SC$_{1}$=$<$subject$>$/(b)- PDP decomposition based on system functions\relax }}{6}}
\newlabel{decomposition}{{4}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Multi-attributes target element\relax }}{6}}
\newlabel{multi-attributes}{{5}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces XACML policy refactoring process\relax }}{6}}
\newlabel{xacml-decomposition}{{6}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {III-B}}Architecture Model Preservation: PEP-PDP Synergy}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Policy refactoring in case the target elements are not empty\relax }}{7}}
\newlabel{xacml-decomposition1}{{7}{7}}
\@writefile{loa}{\contentsline {algorithm}{\numberline {1}{\ignorespaces System security function that describes a PEP enforcement\relax }}{7}}
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Synergic system / Non synergic system\relax }}{7}}
\newlabel{synergy}{{8}{7}}
\citation{testcase}
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Overview of the process of defining and deploying XACML policies\relax }}{8}}
\newlabel{overallprocess}{{9}{8}}
\@writefile{toc}{\contentsline {section}{\numberline {IV}Experimental results}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {IV-A}}Experimental Results: policy refactoring through target elements combination}{8}}
\@writefile{lof}{\contentsline {figure}{\numberline {11}{\ignorespaces Overview of the process of defining and deploying XACML policies\relax }}{8}}
\newlabel{overallprocess}{{11}{8}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {\unhbox \voidb@x \hbox {IV-A}1}Experimental Results using policy decomposition and Xengine}{8}}
\citation{Xengine}
\citation{Xengine1}
\citation{decomposition}
\citation{clustering}
\citation{decomposition}
\citation{XACMLstructure}
\citation{comparaison}
\newlabel{fig:gull}{{10a}{9}}
\newlabel{sub@fig:gull}{{(a)}{a}}
\newlabel{fig:VMS}{{10b}{9}}
\newlabel{sub@fig:VMS}{{(b)}{b}}
\newlabel{fig:ASMS}{{10c}{9}}
\newlabel{sub@fig:ASMS}{{(c)}{c}}
\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces Processing Time for our 3 systems LMS, VMS and ASMS\relax }}{9}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LMS}}}{9}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {VMS}}}{9}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {ASMS}}}{9}}
\newlabel{fig:processing time}{{10}{9}}
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces evaluation time for all the case studies\relax }}{9}}
\@writefile{toc}{\contentsline {section}{\numberline {V}Related work}{9}}
\bibcite{IEEEhowto:kopka}{1}
\bibcite{comparaison}{2}
\bibcite{XACMLstructure}{3}
\bibcite{clustering}{4}
\bibcite{Xengine1}{5}
\bibcite{Xengine}{6}
\bibcite{decomposition}{7}
\bibcite{xacmltesting}{8}
\bibcite{boolean}{9}
\bibcite{site}{10}
\bibcite{testcase}{11}
\bibcite{formal}{12}
\bibcite{legacy}{13}
\@writefile{toc}{\contentsline {section}{\numberline {VI}Conclusion and Future Work}{10}}
\@writefile{toc}{\contentsline {section}{References}{10}}
