Role Mining under Role-Usage Cardinality Constraint

Abstract : With the emergence of Role Based Access Control (RBAC) as the de facto access control model, organizations can now implement and manage many high level security policies. As a means of migration from traditional access control systems to RBAC, different role mining algorithms have been proposed in recent years for finding a minimal set of roles from existing user-permission assignments. While determining such roles, it is often required that certain security objectives are satisfied. A common goal is to enforce the role-usage cardinality constraint, which limits the maximum number of roles any user can have. In this paper, we propose two alternative approaches for role mining with an upper bound on the number of roles that can be assigned to each user, and validate their performance with benchmark data sets.
Type de document :
Communication dans un congrès
Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. Springer, IFIP Advances in Information and Communication Technology, AICT-376, pp.150-161, 2012, Information Security and Privacy Research. 〈10.1007/978-3-642-30436-1_13〉
Liste complète des métadonnées

Littérature citée [13 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01518246
Contributeur : Hal Ifip <>
Soumis le : jeudi 4 mai 2017 - 13:45:37
Dernière modification le : samedi 21 juillet 2018 - 16:58:02
Document(s) archivé(s) le : samedi 5 août 2017 - 13:25:14

Fichier

978-3-642-30436-1_13_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

John John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. Role Mining under Role-Usage Cardinality Constraint. Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. Springer, IFIP Advances in Information and Communication Technology, AICT-376, pp.150-161, 2012, Information Security and Privacy Research. 〈10.1007/978-3-642-30436-1_13〉. 〈hal-01518246〉

Partager

Métriques

Consultations de la notice

166

Téléchargements de fichiers

47