2015
DOI: 10.1007/978-3-319-20810-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Migrating from DAC to RBAC

Abstract: Role Based Access Control (RBAC) is one of the most popular means for enforcing access control. One of the main reasons for this is that it is perceived as the least expensive configuration with respect to security administration. In this paper, we demonstrate that security administration is not always cheaper under RBAC when compared to the traditional Discretionary Access Control (DAC). If RBAC proves to be beneficial, organizations may choose to migrate from DAC to RBAC. There have been many algorithms deve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Step 3. Derive User Assignment Relation 𝒰𝒜 and Permission Assignment Relation 𝒫𝒜 by performing Role Mining: For the automation of this step, we have used DEMiner algorithm proposed by Uzun et al [6]. The primary reason to choose this is because it generates a compact set of roles which are disjoint in their permissions.…”
Section: Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Step 3. Derive User Assignment Relation 𝒰𝒜 and Permission Assignment Relation 𝒫𝒜 by performing Role Mining: For the automation of this step, we have used DEMiner algorithm proposed by Uzun et al [6]. The primary reason to choose this is because it generates a compact set of roles which are disjoint in their permissions.…”
Section: Approachmentioning
confidence: 99%
“…Any Role Mining algorithm could be used, as long as it completely covers the given 𝒰𝒫𝒜. In this particular case, we use the DEMiner algorithm proposed by Uzun et al[6].For each set of experiments, we have compared the access request evaluation time for both ABAC and RBAC. The experiments are performed on a Intel Core i7 2.60 GHz machine with 8.00 GB memory running 64-bit Windows 10.…”
mentioning
confidence: 99%
“…Step 3. Derive User Assignment Relation (UA) and Permission Assignment Relation (PA) by performing Role Mining: For the automation of this step, we have used DEMiner algorithm proposed by Uzun et al [3]. The primary reason to choose this is because it generates a compact set of roles which are disjoint in their permissions.…”
Section: Abac To Rbac Translationmentioning
confidence: 99%
“…Any Role Mining algorithm could be used, as long as it completely covers the given UPA. In this particular case, we use the DEMiner algorithm proposed by Uzun et al [3].…”
Section: Experimental Comparison Of Access Request Evaluation Cost Inmentioning
confidence: 99%
“…This dataset uses the same simple PEs as in [8], namely, π = policy from Phase 3 q = Q pol (π) workL = list of removable roles in π changed = true while ¬empty(workL) ∧ changed sort workL in ascending order by Q role changed = false for r in workL Figure 6: Phase 4: Remove roles. [6,11], [7,10], [8,9], [8,11], [9,11], [10,11], [10,12], [11,13], [14,15], [16,17]. These PEs are designed to cover various relationships between intervals, such as overlapping, consecutive, disjoint, and nested.…”
Section: Datasetsmentioning
confidence: 99%