2015
DOI: 10.1007/978-3-319-27668-7_4
|View full text |Cite
|
Sign up to set email alerts
|

How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining

Abstract: Abstract.Roles have evolved into the de facto standard for access control in Enterprise Identity Management. However, companies struggle to develop and maintain a role-based access control state. For the initial role deployment, role mining is widely used. Due to the high number and complexity of available role mining algorithms, companies fail to perceive which is selected best according to their needs. Furthermore, requirements on the composition of roles such as reduction of administration cost are to be ta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 54 publications
0
5
0
Order By: Relevance
“…The initial creation of ACPs with high quality is addressed by ACP modelling approaches. Existing approaches differ greatly in terms of modelling objectives and their definitions of optimal ACPs (Kunz et al, 2015b;Mitra et al, 2016). Existing proposals typically focus on policy mining, i.e.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The initial creation of ACPs with high quality is addressed by ACP modelling approaches. Existing approaches differ greatly in terms of modelling objectives and their definitions of optimal ACPs (Kunz et al, 2015b;Mitra et al, 2016). Existing proposals typically focus on policy mining, i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Beckerle and Martucci (2013) developed six criteria to determine well-usable ACPs sets and developed metrics to quantify these. Both Kunz et al (2015b) and Mitra et al (2016) present surveys on role mining approaches and point out objectives that role mining algorithms apply to achieve high-quality roles. Jabal et al (2019) define a list of policy analysis criteria with implications to the policy quality.…”
Section: Established Quality Criteriamentioning
confidence: 99%
See 2 more Smart Citations
“…Since the existing role mining method does not consider existing roles in the system, Zhai et al [39] optimized the role mining process by calculating the similarity between the newly generated role set and the original role set. For the problem of role mining under incomplete knowledge condition, Kunz et al [40] studied the quality criteria and feature dependence of role mining technology from 22 dimensions. Blundo et al [41] constrained the role mining process by the number of contained permissions in the role and the number of contained in the user.…”
Section: Related Workmentioning
confidence: 99%