2010
DOI: 10.1145/1880022.1880030
|View full text |Cite
|
Sign up to set email alerts
|

Mining Roles with Multiple Objectives

Abstract: With the growing adoption of Role-Based Access Control (RBAC) in commercial security and identity management products, how to facilitate the process of migrating a non-RBAC system to an RBAC system has become a problem with significant business impact. Researchers have proposed to use data mining techniques to discover roles to complement the costly top-down approaches for RBAC system construction. An important problem is how to construct RBAC systems with low complexity. In this article, we define the notion … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
100
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(103 citation statements)
references
References 23 publications
(41 reference statements)
0
100
0
Order By: Relevance
“…Other non-evolutionary approaches have been proposed for mining policies from logs for less expressive access control models (e.g., RBAC [7,8]). In some cases, additional information, besides the request logs, is needed as training data [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other non-evolutionary approaches have been proposed for mining policies from logs for less expressive access control models (e.g., RBAC [7,8]). In some cases, additional information, besides the request logs, is needed as training data [9].…”
Section: Related Workmentioning
confidence: 99%
“…We assess the complexity of a policy P with the weighted structural complexity (WSC) [8]. WSC is a weighted sums of the complexity of rule components (e U , e R , O and c)-see [5] for the details.…”
Section: Problem Statementmentioning
confidence: 99%
“…Other role mining approaches include role mining with noisy data [12], where the input data is first cleansed to remove the noise before generating candidate roles, role mining based on weights [10] in which a certain weight is associated with each permission depending on its importance, mining roles having low structural complexity and semantic meaning [11], and Visual Role Mining (VRM) [4], which enumerates roles based on a visual analysis of the graphical representation of the user-permission assignments. Xu and Stoller [19] propose algorithms for role mining which optimize a number of policy quality metrics.…”
Section: Related Workmentioning
confidence: 99%
“…Our algorithms aim to optimize the policy's weighted structural complexity (WSC), which is a generalization of policy size [8]. The weighted structural complexity of a core PRBAC policy is defined by…”
Section: The Problemmentioning
confidence: 99%
“…Xu and Stoller's elimination algorithm is partly inspired by Molloy et al's Hierarchical Miner algorithm for mining roles with semantic meaning based on user-attribute data [8]. Colantonio et al developed a different method for taking user-attribute data into account during role mining; their method partitions the set of users based on the values of selected attributes, and then performs role mining separately for each of the resulting sets of users [2].…”
Section: Related Workmentioning
confidence: 99%