PostProcessing in Constrained Role Mining

5Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Constrained role mining aims to define a valid set of roles efficiently representing the organization of a company, easing the management of the security policies. Since the associated problems are NP hard, usually some heuristics are defined to find some sub-optimal solutions. In this paper we define two heuristics for the Permission Distribution and Role Usage Cardinality Constraints in the post processing framework, i.e. refining the roles produced by some other algorithm. We discuss the performance of the proposed heuristics applying them to some standard datasets showing the improvements w.r.t. previously available solutions.

Cite

CITATION STYLE

APA

Blundo, C., Cimato, S., & Siniscalchi, L. (2018). PostProcessing in Constrained Role Mining. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11314 LNCS, pp. 204–214). Springer Verlag. https://doi.org/10.1007/978-3-030-03493-1_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free