Proceedings of the 17th ACM Symposium on Access Control Models and Technologies 2012
DOI: 10.1145/2295136.2295146
|View full text |Cite
|
Sign up to set email alerts
|

Algorithms for mining meaningful roles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(86 citation statements)
references
References 13 publications
0
86
0
Order By: Relevance
“…This assumption is based on the claims of several publications (e.g. (Xu and Stoller, 2012), (Zhang et al, 2013b)) of outperforming competitive approaches in terms of the quality of generated roles. A total of 23 different quality criteria can be identified.…”
Section: Quality-related Criteriamentioning
confidence: 99%
See 1 more Smart Citation
“…This assumption is based on the claims of several publications (e.g. (Xu and Stoller, 2012), (Zhang et al, 2013b)) of outperforming competitive approaches in terms of the quality of generated roles. A total of 23 different quality criteria can be identified.…”
Section: Quality-related Criteriamentioning
confidence: 99%
“…Furthermore, restrictions on the composition of a role, e.g. by allowing only certain attributes of users in a role are possible (Xu and Stoller, 2012).…”
Section: Quality-related Criteriamentioning
confidence: 99%
“…Xu and Stoller [19] propose algorithms for role mining which optimize a number of policy quality metrics. Verde et al present an approach in [18] to make role mining applicable to large datasets and hence scalable.…”
Section: Related Workmentioning
confidence: 99%
“…Our algorithm always generates policies with full inheritance [13]. This implies that a role hierarchy edge in RH all is included in the result policy whenever the roles that it connects are included in the policy.…”
Section: Mining Hierarchical Prbac Policies: Elimination Algorithmmentioning
confidence: 99%
“…Third, the algorithm decides which of the candidate roles generated in the first two steps to include in the final policy. Inspired by [13], we consider two strategies for this. The elimination strategy repeatedly removes low-quality roles from the set of candidate roles, until no more roles can be removed without losing some of the permissions granted in the given ACL policy.…”
Section: Introductionmentioning
confidence: 99%