2016 11th International Conference on Availability, Reliability and Security (ARES) 2016
DOI: 10.1109/ares.2016.32
|View full text |Cite
|
Sign up to set email alerts
|

Role Mining with Missing Values

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Learning generative models from logs [49] and missing value tolerant variants of matrix factorization such as Multiple Factor Optimization (MFO) [44] have both been shown to be effective at handling incomplete activity records, and both approaches should be investigated. More generally, formalizing the contributions of different sources of overrides could lead to the development of a more nuanced and configurable unnecessary privilege metric, analogous to W SC.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Learning generative models from logs [49] and missing value tolerant variants of matrix factorization such as Multiple Factor Optimization (MFO) [44] have both been shown to be effective at handling incomplete activity records, and both approaches should be investigated. More generally, formalizing the contributions of different sources of overrides could lead to the development of a more nuanced and configurable unnecessary privilege metric, analogous to W SC.…”
Section: Resultsmentioning
confidence: 99%
“…However, the mechanism is agnostic to the origin of the overrides, and more advanced techniques could be applied as well or instead. In particular, learning generative models from logs [49] and missing value tolerant variants of matrix factorization such as Multiple Factor Optimization (MFO) [44] have both been shown to be effective at handling incomplete activity records, and their results could be applied as overrides.…”
Section: Privilege Assignment Overridesmentioning
confidence: 99%
“…It can eliminate inappropriate edges and improved the quality of generated roles. Vavilis et al [28] studied the minimal noise role mining problem and the multiple factor optimization role mining problem to mine roles from access control logs with noise information.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers have emphasized on the importance of this stage [12][13] particularly to generate a clean and quality data and usually pre-processing stage involve the process to clean the noises that might affect the results.…”
Section: Pre-processingmentioning
confidence: 99%
“…Assumed a set of users (U), a set of permissions (P) and a user-permission assignment (UPA) is given, acquire a set of roles (R), a user-role assignment (UA) and a role-permission assignment (PA) while reducing the number of roles |R| = k. In matrix notation, it can be formulated as [12]:…”
Section: Definition 3 (Basic Rmp)mentioning
confidence: 99%