2012
DOI: 10.4018/jwsr.2012100101
|View full text |Cite
|
Sign up to set email alerts
|

Over-Fitting and Error Detection for Online Role Mining

Abstract: Recent research has attempted to use role-based approaches to recommend mobile services to other members among the same group in a context dependent manner. However, the traditional role mining approaches originated from the domain of security control tend to be rigid and may not be able to capture human behaviors adequately. In particular, during the course of role mining process, these approaches easily result in over-fitting, i.e., too many roles with slightly different service consumption patterns are foun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…The knowledge can be discovered by a central server based on a consolidated Ψ t c gathered from a user community with user-role assignment matrix Θ t c and user-context-behavior relation matrix Ψ t c as outputs [17]. Role coverage vector RC t is a vector of area-of-roles in a role set as they appear in a Ψ t c matrix.…”
Section: A Role-based Service Modelmentioning
confidence: 99%
“…The knowledge can be discovered by a central server based on a consolidated Ψ t c gathered from a user community with user-role assignment matrix Θ t c and user-context-behavior relation matrix Ψ t c as outputs [17]. Role coverage vector RC t is a vector of area-of-roles in a role set as they appear in a Ψ t c matrix.…”
Section: A Role-based Service Modelmentioning
confidence: 99%
“…In contrast to most approaches (e.g. [3,53,60]), some techniques allow to deviate to a certain extent from the initial UP A-matrix based on a given threshold (the so called δ − RM P [51]) [5,35]. Completeness therefore measures the quality of a RBAC state by measuring the degree to which a resulting role set represents the initial access control situation.…”
Section: Criteriamentioning
confidence: 99%
“…In [29], for instance, the permission similarity is measured using the Euclidean Distance. Furthermore, the Jaccard Similarity is a popular metric used in a variety of approaches [5,40,57].…”
Section: Criteriamentioning
confidence: 99%
See 1 more Smart Citation
“…In (Jafari et al, 2009), for instance, the permission similarity is measured using the Euclidean Distance. Furthermore, the Jaccard Similarity is a popular metric used in a variety of approaches (Mandala et al, 2012;Xu and Stoller, 2013a;Chu et al, 2012).…”
Section: Quality-related Criteriamentioning
confidence: 99%