2012
DOI: 10.1109/tkde.2011.37
|View full text |Cite
|
Sign up to set email alerts
|

Visual Role Mining: A Picture Is Worth a Thousand Roles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(26 citation statements)
references
References 25 publications
0
26
0
Order By: Relevance
“…Visual Role Mining is a fairly new technique initially proposed in [10]. It reorders rows and columns of the input UP A-matrix in order to create clusters of adjoined permissions.…”
Section: Development Of Role Mining Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Visual Role Mining is a fairly new technique initially proposed in [10]. It reorders rows and columns of the input UP A-matrix in order to create clusters of adjoined permissions.…”
Section: Development Of Role Mining Researchmentioning
confidence: 99%
“…Matrix sorting aims at covering an initial access control state by sorting the input UP A-matrix based on user accounts with similar permissions and permissions that are assigned a similar set of user accounts. [10] introduced the ADVISER and EXTRACT algorithms that generate a matrix representation of the initial UP A-matrix that clusters permissions and user accounts together. As a result, large areas covering initial UP A can be visually detected by a human role engineer.…”
Section: Minimize Users/permissions Per Role and Minimize/maximize Rolementioning
confidence: 99%
“…Visual Role Mining is a fairly new technique initially proposed in (Colantonio et al, 2012). It reorders rows and columns of the input UPA-matrix in order to create clusters of adjoined permissions.…”
Section: Role Mining Surveymentioning
confidence: 99%
“…Matrix sorting aims at covering an initial access control state by sorting the input UPA-matrix based on user accounts with similar permissions and permissions that are assigned a similar set of user accounts. (Colantonio et al, 2012) introduced the ADVISER and EXTRACT algorithms that generate a matrix representation of the initial UPA-matrix that clusters permissions and user accounts together. As a result, large areas covering initial UPA can be visually detected by a human role engineer.…”
Section: Quality-related Criteriamentioning
confidence: 99%
“…Other role mining approaches include role mining with noisy data [12], where the input data is first cleansed to remove the noise before generating candidate roles, role mining based on weights [10] in which a certain weight is associated with each permission depending on its importance, mining roles having low structural complexity and semantic meaning [11], and Visual Role Mining (VRM) [4], which enumerates roles based on a visual analysis of the graphical representation of the user-permission assignments. Xu and Stoller [19] propose algorithms for role mining which optimize a number of policy quality metrics.…”
Section: Related Workmentioning
confidence: 99%