Reconfiguration of RBAC schemes by genetic algorithms

8Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays,Role-Based Access Control (RBAC) is a widespread access control model. Search of the "users-roles" and "roles-permissions" mappings for the given “users-permissions” mapping is the problem of Data Mining called as Role Mining Problem (RMP). However,in the known works devoted to the RMP,the problem of RBAC scheme reconfiguration and methods for solving it are not considered. The paper defines the statement of the problem of RBAC scheme reconfiguration and suggests a genetic algorithm for solving it. Experimental results show the algorithm has a high enough effectiveness.

Cite

CITATION STYLE

APA

Saenko, I., & Kotenko, I. (2017). Reconfiguration of RBAC schemes by genetic algorithms. Studies in Computational Intelligence, 678, 89–98. https://doi.org/10.1007/978-3-319-48829-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free