2012 Seventh International Conference on Availability, Reliability and Security 2012
DOI: 10.1109/ares.2012.77
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides

Abstract: Abstract-Mining approaches, such as role mining or organizational mining, can be applied to derive permissions and roles from a system's configuration or from log files. In this way, mining techniques document the current state of a system and produce current-state RBAC models. However, such currentstate RBAC models most often follow from structures that have evolved over time and are not the result of a systematic rights management procedure. In contrast, role engineering is applied to define a tailored RBAC … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…For SCT and WCT, the roles r 1 , r 2 , r 3 , r 4 and r 5 are selected and the triples u 2 , p 1 , 7 AM-8 AM and u 3 , p 4 , 7 AM-8 AM remain uncovered. For SCUT and r 3 , r 5 r 2 r 3 , r 5 r 2 r 3 r 2 r 3 r 2 2 r 1 , r 2 , r 5 , r 8 r 3 , r 5 r 1 , r 2 , r 5 , r 8 r 3 r 2 r 3 r 2 r 3 3 r 1 , r 5 , r 12 r 1 , r 5 , r 9 , r 12 r 1 r 1 , r 9 r 1 r 1 r 1 r 1 4 r 5 , r 12 r 5 , r 12 r 4 , r 6 , r 7 r 4 , r 6 , r 7 , r 9 , r 11 r 5 r 5 r 4 r 4 5 r 4 , r 6 , r 7 r 4 , r 6 , r 7 , r 9 , r 11 r 6 , r 7 r 6 , r 7 r 4 r 4 r 6 r 6 6 r 6 , r 7 r 6 , r 7 r 7 r 7 r 6 r 6 r 7 r 7 7 r 7 r 7 r 5 , r 12 r 5 , r 12 r 7 r 7 r 5 r 5 Table 4 Output for the TUPA of Table 2 (a) UA matrix (b) PA matrix (c) REB r 1 r 2 r 3 r 4 r 5 r 6 r 7 u 1 1 WCUT, the roles r 1 , r 2 , r 3 , r 4 , r 6 and r 7 are selected and the triples u 3 , p 2 , 9 AM-11 AM and u 3 , p 3 , 9 AM-11 AM remain partially covered.…”
Section: (1) Candidate Role Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…For SCT and WCT, the roles r 1 , r 2 , r 3 , r 4 and r 5 are selected and the triples u 2 , p 1 , 7 AM-8 AM and u 3 , p 4 , 7 AM-8 AM remain uncovered. For SCUT and r 3 , r 5 r 2 r 3 , r 5 r 2 r 3 r 2 r 3 r 2 2 r 1 , r 2 , r 5 , r 8 r 3 , r 5 r 1 , r 2 , r 5 , r 8 r 3 r 2 r 3 r 2 r 3 3 r 1 , r 5 , r 12 r 1 , r 5 , r 9 , r 12 r 1 r 1 , r 9 r 1 r 1 r 1 r 1 4 r 5 , r 12 r 5 , r 12 r 4 , r 6 , r 7 r 4 , r 6 , r 7 , r 9 , r 11 r 5 r 5 r 4 r 4 5 r 4 , r 6 , r 7 r 4 , r 6 , r 7 , r 9 , r 11 r 6 , r 7 r 6 , r 7 r 4 r 4 r 6 r 6 6 r 6 , r 7 r 6 , r 7 r 7 r 7 r 6 r 6 r 7 r 7 7 r 7 r 7 r 5 , r 12 r 5 , r 12 r 7 r 7 r 5 r 5 Table 4 Output for the TUPA of Table 2 (a) UA matrix (b) PA matrix (c) REB r 1 r 2 r 3 r 4 r 5 r 6 r 7 u 1 1 WCUT, the roles r 1 , r 2 , r 3 , r 4 , r 6 and r 7 are selected and the triples u 3 , p 2 , 9 AM-11 AM and u 3 , p 3 , 9 AM-11 AM remain partially covered.…”
Section: (1) Candidate Role Generationmentioning
confidence: 99%
“…Baumgrass and Strembeck [1] propose a set of guidelines that allow migration of current-state RBAC models derived from role mining approaches to target-state RBAC models derived from role engineering approaches. Hachana et al [17] formally define the problem of comparing two sets of roles and prove it to be NP-complete.…”
Section: Related Workmentioning
confidence: 99%