2013
DOI: 10.1007/978-3-642-39256-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Toward Mining of Temporal Roles

Abstract: Abstract. In Role-Based Access Control (RBAC), users acquire permissions through their assigned roles. Role mining, the process of finding a set of roles from direct user-permission assignments, is essential for successful implementation of RBAC. In many organizations it is often required that users are given permissions that can vary with time. To handle such requirements, temporal extensions of RBAC like Temporal-RBAC (TRBAC) and Generalized Temporal Role-Based Access Control (GTRBAC) have been proposed. Exi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(36 citation statements)
references
References 20 publications
0
35
0
Order By: Relevance
“…This problem definition extends the work presented in [28] by incorporating both exact and inexact variants of the problem. The acceptable level of mismatch for the inexact variant can be set appropriately by specifying the value of an input parameter to the problem.…”
Section: Introductionmentioning
confidence: 77%
See 2 more Smart Citations
“…This problem definition extends the work presented in [28] by incorporating both exact and inexact variants of the problem. The acceptable level of mismatch for the inexact variant can be set appropriately by specifying the value of an input parameter to the problem.…”
Section: Introductionmentioning
confidence: 77%
“…Note that an exact version of the problem where δ = 0, was introduced as the Temporal Role Mining Problem (TRMP) in [28]. Hence, TRMP is a special case of GTRMP.…”
Section: Generalized Temporal Role Mining Problem (Gtrmp)mentioning
confidence: 99%
See 1 more Smart Citation
“…2). Timestamps as an attribute of permissions are, for instance, only considered by one approach [41]. However, their integration into role mining seems promising as they heavily can influence role design.…”
Section: Discussionmentioning
confidence: 99%
“…Timestamps as an attribute of permissions are, for instance, only considered by one approach (Mitra et al, 2013). However, their integration into role mining seems promising as they heavily can influence role design.…”
Section: Discussionmentioning
confidence: 99%