2016
DOI: 10.1016/j.cose.2016.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Mining temporal roles using many-valued concepts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(30 citation statements)
references
References 38 publications
0
29
0
Order By: Relevance
“…Bertino et al allow the REB to specify various conditions and events that enabled or disable a role. Like Mitra et al [8,9], we are interested only in temporal conditions and therefore consider a limited form of REB, which we call a role-time assignment. Specifically, a role-time assignment TA maps each role to a BPES.…”
Section: Background On Trbacmentioning
confidence: 99%
See 2 more Smart Citations
“…Bertino et al allow the REB to specify various conditions and events that enabled or disable a role. Like Mitra et al [8,9], we are interested only in temporal conditions and therefore consider a limited form of REB, which we call a role-time assignment. Specifically, a role-time assignment TA maps each role to a BPES.…”
Section: Background On Trbacmentioning
confidence: 99%
“…Mitra et al developed another temporal role mining algorithm, called the CO-TRAPMP-MVCL algorithm [9]. It minimizes a restricted variant of WSC based on the sizes of two components of the policy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since role mining was proposed, 6 it has been used to generate roles according to different optimization objectives, such as minimizing the number of generated roles or the weighted structure complexity, 12 satisfying various constraints such as separation of duty, least privilege, and temporal constraint, 13,14 and semantic meaning based on the information about the business process or the user attributes. 15,16 Hachana et al 17 formally defined the problem of role set comparison that is proved to be NP-complete and proposed a greedy algorithm to map inherent relations between the original set of roles and the mined set of roles based on algebraic expression, but the system must support the negation of roles, which are not satisfied by most systems.…”
Section: Related Workmentioning
confidence: 99%
“…Each iteration begins by sorting the candidate roles in descending order by the number of assignments they can cover (line 4), and the detail of procedure Sort(CR, UPA) is described in Algorithm 3. At the beginning of main loop when |GR| < |QR| (lines 5-20), for each candidate role (CR i ), the qualified role (QR ′ j ) with the maximum similarity (Sim(k)) is selected and calculate CR i 's Score, which is a deformation of the Objective Function (lines [11][12][13][14][15]. The candidate role with the maximum Score (BestScore) is added to GR (line 20) and flip the element 1 covered by it to 0 in the matrix UPA (line 24), the detail of which is described in Algorithm 4.…”
Section: Second Phasementioning
confidence: 99%