Proceedings of the 25th ACM Symposium on Access Control Models and Technologies 2020
DOI: 10.1145/3381991.3395597
|View full text |Cite
|
Sign up to set email alerts
|

Informed Privilege-Complexity Trade-Offs in RBAC Configuration

Abstract: Role-Based Access Control (RBAC) has the potential both to simplify administration and improve an organization's security. But for non-trivial configurations, there is a conflict between defining fine-grained roles which adhere to the principle of least privilege, and coarse-grained roles which simplify administration by reducing configuration complexity. In this paper we propose OnPar, a multi-objective role mining approach which introduces minimization of unnecessary privilege as a role mining objective, alo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…However, the phenomena that lead to disruptions are very complex and non-linear and no satisfactory model has yet been developed to avoid them or predict when they will occur and what kind of impacts they will cause. For this reason, the ML and AI techniques associated with RPA/IPA have begun to be widely used in recent years [8,10,26,85,104,115,131,145,148,152,176,201,204,215,217,260,272,278,290,295,299,304,311,312,314,325,[329][330][331][352][353][354][355][356][357].…”
Section: Disruption Avoidancementioning
confidence: 99%
“…However, the phenomena that lead to disruptions are very complex and non-linear and no satisfactory model has yet been developed to avoid them or predict when they will occur and what kind of impacts they will cause. For this reason, the ML and AI techniques associated with RPA/IPA have begun to be widely used in recent years [8,10,26,85,104,115,131,145,148,152,176,201,204,215,217,260,272,278,290,295,299,304,311,312,314,325,[329][330][331][352][353][354][355][356][357].…”
Section: Disruption Avoidancementioning
confidence: 99%
“…Thus, this approach improves the quality of role mining. Currey et al [15] proposed a multi-objective role mining approach that minimizes unnecessary permissions as the formal goal of role mining. Jafarian et al [16] transformed the role mining problem into a constraint satisfaction problem.…”
Section: Related Workmentioning
confidence: 99%