2014
DOI: 10.1002/sec.1177
|View full text |Cite
|
Sign up to set email alerts
|

Role mining based on permission cardinality constraint and user cardinality constraint

Abstract: Constraint is an essential aspect of role‐based access control (RBAC) and is sometimes argued to be the principle motivation for RBAC. However, most of role mining algorithms do not consider the constraint. Furthermore, they just compare the least cost of the authorization process but do not consider how to assess the accuracy of the derived role state, thus, providing the motivation for this work. In this paper, we first define a wide variety of constraints, especially the permission cardinality constraint an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…The CPA chooses roles by iteratively picking the role with the largest number of permissions that are yet uncovered and then ensures that no user is assigned more than a given number of roles [38]. In order to limit the maximum number of users or permissions related to a role, Ma et al [26] proposed a role mining algorithm to generate roles based on permission cardinality constraints and user cardinality constraints. In order to simultaneously limit the maximum number of roles assigned to a user and a related permission, Harika et al proposed the two role-optimization methods: Post processing and concurrent processing.…”
Section: Methods Of Role Optimizationmentioning
confidence: 99%
See 3 more Smart Citations
“…The CPA chooses roles by iteratively picking the role with the largest number of permissions that are yet uncovered and then ensures that no user is assigned more than a given number of roles [38]. In order to limit the maximum number of users or permissions related to a role, Ma et al [26] proposed a role mining algorithm to generate roles based on permission cardinality constraints and user cardinality constraints. In order to simultaneously limit the maximum number of roles assigned to a user and a related permission, Harika et al proposed the two role-optimization methods: Post processing and concurrent processing.…”
Section: Methods Of Role Optimizationmentioning
confidence: 99%
“…The PCC [26] states that, for a given set of U of users, set R of roles, and threshold MRC permission , the number of roles to which any permission can be assigned should not exceed MRC permission . This can be formalized as follows:…”
Section: Rbac Constraintsmentioning
confidence: 99%
See 2 more Smart Citations
“…Other papers examined the permission-distribution cardinality constraint, which is the dual of the role-usage constraint and restricts the number of roles to which a permission can belong to [14]. Sometimes, multiple cardinality constraints have been considered [3], [14], [21], [24].…”
Section: Introductionmentioning
confidence: 99%