2019
DOI: 10.3390/fi11090201
|View full text |Cite
|
Sign up to set email alerts
|

Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations

Abstract: Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bottom-up role-engineering technology, is an effective method to migrate from a non-RBAC system to an RBAC system. However, conventional role-mining approaches not only do not consider the separation of duty constraints, but also cannot ensure the security of a constru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…In addition to these methods for satisfying cardinality constraints, Sarana et al [40] proposed three role-optimization methods, including separation-of-duty constraints either, during, or after, the mining process. In order to satisfy separation-of-duty constraints and ensure authorization security, Sun et al [41] proposed a method called role-mining optimization, with separation-of-duty constraints and security detection for authorizations.…”
Section: Methods Of Role Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to these methods for satisfying cardinality constraints, Sarana et al [40] proposed three role-optimization methods, including separation-of-duty constraints either, during, or after, the mining process. In order to satisfy separation-of-duty constraints and ensure authorization security, Sun et al [41] proposed a method called role-mining optimization, with separation-of-duty constraints and security detection for authorizations.…”
Section: Methods Of Role Optimizationmentioning
confidence: 99%
“…To simulate the actual scenarios while satisfying the security requirements in the role-engineering system, we adopt the method of generating the t-t SMER constraints [41]. The value of the cardinality constraint is greater than or equal to 2, and the density of the user-capability matrix changes from 0.4 to 0.6 with a step of 0.05.…”
Section: Methodsmentioning
confidence: 99%
“…Sarana et al [41] proposed three methods for role optimization with the separation-of-duty constraints. To satisfy separation-ofduty constraints while ensuring authorization security, Sun et al [42] constructed various mutually exclusive constraints to implement the given separation-of-duty constraints, converted the authorization query problem into a partial maximal satisfiability problem, and proposed a novel role-mining optimization method.…”
Section: Role Engineering With Constraintsmentioning
confidence: 99%
“…A role mining framework was proposed in [25] taking into account the organizational entity-relation information. The work done in [26], [27] showed the role mining and role engineering optimization with separation of duty and cardinality constraints.…”
Section: Related Workmentioning
confidence: 99%