2019
DOI: 10.1155/2019/8085303
|View full text |Cite
|
Sign up to set email alerts
|

RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information

Abstract: Role-based access control (RBAC) is widely adopted in network security management, and role mining technology has been extensively used to automatically generate user roles from datasets in a bottom-up way. However, almost all role mining methods discover the user roles from existing user-permission assignments, which neglect the dependency relationships between user permissions. To extend the ability of role mining technology, this paper proposes a novel role mining framework based on multi-domain information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…Bai et al [2] propose a framework for role mining based on the multi-domain information named RMMDI. This framework uses information in multi-domains, including network domain, digital domain, and physical domain, to discover the relationships between users and permissions.…”
Section: Role Mining Via Nmfmentioning
confidence: 99%
“…Bai et al [2] propose a framework for role mining based on the multi-domain information named RMMDI. This framework uses information in multi-domains, including network domain, digital domain, and physical domain, to discover the relationships between users and permissions.…”
Section: Role Mining Via Nmfmentioning
confidence: 99%
“…Role mining and role engineering are the main concerned research areas in RBAC research. A role mining framework was proposed in [25] taking into account the organizational entity-relation information. The work done in [26], [27] showed the role mining and role engineering optimization with separation of duty and cardinality constraints.…”
Section: Related Workmentioning
confidence: 99%
“…With the rapid development of the Internet, the current big data technology is characterized by large data volume, fast output speed, wide data types, and complex relationships among data. Therefore, it faces many difficulties and security risks in the process of data collection, data storage, data transmission, and data application [1][2][3]. For the current problems, traditional big data security technology has been difficult to operate effectively in the big data environment [4][5][6].…”
Section: Introductionmentioning
confidence: 99%