Abstract
1. Introduction
2. Related works
3. Propdsed approach : Path-based Verification Cache(VC)
3.1. Cache Entry based on Privilege Delegation Path
3.2. Privilege veriflcation procedure
3.3 Consistency of cache entry : delayed revocation check
4. Performance Evaluation
4.1. Elapsed time of privilege verification
5. Conclusion
References