2010
DOI: 10.2478/v10065-010-0060-6
|View full text |Cite
|
Sign up to set email alerts
|

Modelling role hierarchy structure using the Formal Concept Analysis

Abstract: We demonstrate how one can use the formal concept analysis (FCA) to obtain the role hierarchy for the role based access control from the existing access control matrix. We also discuss assesed by means of FCA the quality of security system and finding users with excess permissions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
(13 reference statements)
0
2
0
Order By: Relevance
“…Suyun et al [9] have proposed an access control model for dynamic policies and constructed a formal classification concept lattice with the support of FCA. Scibor and Bartosz [25] have demonstrated the usage of FCA to obtain the role hierarchy for RBAC from existing access control matrix. Sellami et al [26]have proposed a formal concept analysis based approach for secure data integration with the support of global policy generation and global schema.…”
Section: Introductionmentioning
confidence: 99%
“…Suyun et al [9] have proposed an access control model for dynamic policies and constructed a formal classification concept lattice with the support of FCA. Scibor and Bartosz [25] have demonstrated the usage of FCA to obtain the role hierarchy for RBAC from existing access control matrix. Sellami et al [26]have proposed a formal concept analysis based approach for secure data integration with the support of global policy generation and global schema.…”
Section: Introductionmentioning
confidence: 99%
“…They have applied description logic to formalize RBAC and further to capture the constraints. Recently, Sobieski and Zielinski [11] have modeled the role hierarchy for RBAC from the access control matrix using FCA. The possible roles are derived from the concept intents of the lattice structure associated with access control matrix.…”
Section: Introductionmentioning
confidence: 99%