Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653675
|View full text |Cite
|
Sign up to set email alerts
|

A probabilistic approach to hybrid role mining

Abstract: Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining discovers a set of roles together with an assignment of users to roles. The results should closely agree with the direct assignment. Moreover, the roles should be understandable from the business perspective in that they reflect functional roles within the enterprise. This requires hybrid role mining methods that work with both direct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
75
1
3

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(79 citation statements)
references
References 23 publications
0
75
1
3
Order By: Relevance
“…Attribute-based Role Mining such as (Frank et al, 2009) are trying to incorporate business information through attributes into role mining. They rely on the assumption that additional semantic data is available and can be taken into account.…”
Section: Role Mining Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Attribute-based Role Mining such as (Frank et al, 2009) are trying to incorporate business information through attributes into role mining. They rely on the assumption that additional semantic data is available and can be taken into account.…”
Section: Role Mining Surveymentioning
confidence: 99%
“…It can be seen as one of the most advanced measures that solely relies on the components of an RBAC state. It is usable for both, individual roles and role sets, and thus allows for a good AnalyzingQualityCriteriainRole-basedIdentityandAccessManagement Attribute-based Approaches (Frank et al, 2009) (Han et al, 2012) Uses criteria: Yes No comparability of RBAC states. As a result of its popularity, several existing role mining approaches are able to consider the WSC.…”
Section: Quality-related Criteriamentioning
confidence: 99%
“…As for the bottom-up approach, Kuhlmann et al [13] first introduced the term "role mining", trying to apply existing data mining techniques to elicit roles from existing access data. After that, several algorithms explicitly designed for role engineering were proposed [10,11,18,20,21]. Several works prove that the role mining problem is reducible to many other well-known NP-hard problems, such as clique partition, binary matrix factorization, bi-clustering, graph vertex coloring [7] to cite a few.…”
Section: Related Workmentioning
confidence: 99%
“…Only few recent works value business requirements in role mining [2,4,11,14]. Their main limitation is to propose theoretical frameworks that are difficult to apply in real cases.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation