2016
DOI: 10.1145/2871148
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Role Mining

Abstract: Role-Based Access Control (RBAC) is the most widely used model for advanced access control deployed in diverse enterprises of all sizes. RBAC critically depends on defining roles, which are a functional intermediate between users and permissions. Thus, for RBAC to be effective, an appropriate set of roles needs to be identified. Since many organizations already have user-permission assignments defined in some form, it makes sense to identify roles from this existing information. This process, known as role min… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 84 publications
(70 citation statements)
references
References 96 publications
0
69
0
1
Order By: Relevance
“…[7,9,19,46,51,52,63]. In the literature the problem appears under different names like Discrete Basis Problem [51] or Minimal Noise Role Mining Problem [64,46,53]. P-Matrix Approximation.…”
Section: Low Boolean-rank Approximationmentioning
confidence: 99%
“…[7,9,19,46,51,52,63]. In the literature the problem appears under different names like Discrete Basis Problem [51] or Minimal Noise Role Mining Problem [64,46,53]. P-Matrix Approximation.…”
Section: Low Boolean-rank Approximationmentioning
confidence: 99%
“…[7,8,12,27,29,30,38]. In the literature the problem appears under different names like Discrete Basis Problem [29] or Minimal Noise Role Mining Problem [27,31,39].…”
Section: Previous Workmentioning
confidence: 99%
“…Before proving the claim, let us show how it concludes the proof of the lemma. By (31) and Claim 5, we have that…”
mentioning
confidence: 93%
“…The bottom-up approaches [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21] follow a similar principle of deriving the policy from the existing user-permission assignment. [22] provides a comprehensive literature survey on this topic. There has also been work on mining ABAC policies [4], [23], [24], [25].…”
Section: Related Workmentioning
confidence: 99%