2013
DOI: 10.1145/2445566.2445567
|View full text |Cite
|
Sign up to set email alerts
|

Role Mining with Probabilistic Models

Abstract: Role mining tackles the problem of finding a role-based access control (RBAC) configuration, given an access-control matrix assigning users to access permissions as input. Most role mining approaches work by constructing a large set of candidate roles and use a greedy selection strategy to iteratively pick a small subset such that the differences between the resulting RBAC configuration and the access control matrix are minimized. In this paper, we advocate an alternative approach that recasts role mining as a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(31 citation statements)
references
References 39 publications
0
31
0
Order By: Relevance
“…Limiting the maximum allowed number of parent or child roles of a role or the maximal hierarchy depth can ease administrative staff's understanding of the overall role model. Note that [15] already considers RBAC hierarchies. However, they only introduce an overall hierarchy depth of two and indicate the possibility to extend their probabilistic approach with more layers.…”
Section: Discussionmentioning
confidence: 99%
“…Limiting the maximum allowed number of parent or child roles of a role or the maximal hierarchy depth can ease administrative staff's understanding of the overall role model. Note that [15] already considers RBAC hierarchies. However, they only introduce an overall hierarchy depth of two and indicate the possibility to extend their probabilistic approach with more layers.…”
Section: Discussionmentioning
confidence: 99%
“…Since MBC is an NPhard problem, a heuristic strategy has been presented in [9] for finding the minimum biclique cover of a bipartite graph which can be used to find the minimum set of roles covering all the user-permission assignments. In [11], the authors formulate the role mining problem as a predictive problem and call it as Inference RMP. They propose two probabilistic models, namely, disjoint-decomposition model (DDM) and multi-assignment clustering (MAC) to generate roles from the available user-permission assignments.…”
Section: Related Workmentioning
confidence: 99%
“…Several RMP variants relax the abovementioned primary constraint and allow for a limited amount of difference between UA × PA and UPA or set the objective to be one of minimizing this difference under the constraint that the number of roles should be bounded from above by a given number; see, e.g., Lu et al (2008), Vaidya et al (2010), and Frank et al (2013). Lu et al (2008) formulate the basic RMP and several of its variants using binary integer programming and provide heuristic solutions obtained via greedy algorithms.…”
Section: Review Of Relevant Literaturementioning
confidence: 99%
“…This can help determine a suitable stopping condition when employing probabilistic algorithms for the basic RMP. Frank et al (2008Frank et al ( , 2013 propose a probabilistic scheme to solve the role mining problem. Different from most RMP studies that try to compress the UPAs into UAs and PAs, they propose that RMP is more an inference problem than a data compression problem.…”
Section: Review Of Relevant Literaturementioning
confidence: 99%