Role Mining under Role-Usage Cardinality Constraint - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Role Mining under Role-Usage Cardinality Constraint

John C. John
  • Fonction : Auteur
  • PersonId : 1007513
Shamik Sural
  • Fonction : Auteur
  • PersonId : 986165
Vijayalakshmi Atluri
  • Fonction : Auteur
  • PersonId : 986166
Jaideep S. Vaidya
  • Fonction : Auteur
  • PersonId : 934514

Résumé

With the emergence of Role Based Access Control (RBAC) as the de facto access control model, organizations can now implement and manage many high level security policies. As a means of migration from traditional access control systems to RBAC, different role mining algorithms have been proposed in recent years for finding a minimal set of roles from existing user-permission assignments. While determining such roles, it is often required that certain security objectives are satisfied. A common goal is to enforce the role-usage cardinality constraint, which limits the maximum number of roles any user can have. In this paper, we propose two alternative approaches for role mining with an upper bound on the number of roles that can be assigned to each user, and validate their performance with benchmark data sets.
Fichier principal
Vignette du fichier
978-3-642-30436-1_13_Chapter.pdf (155.65 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01518246 , version 1 (04-05-2017)

Licence

Paternité

Identifiants

Citer

John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep S. Vaidya. Role Mining under Role-Usage Cardinality Constraint. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.150-161, ⟨10.1007/978-3-642-30436-1_13⟩. ⟨hal-01518246⟩
413 Consultations
155 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More