Role mining under role-usage cardinality constraint

28Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the emergence of Role Based Access Control (RBAC) as the de facto access control model, organizations can now implement and manage many high level security policies. As a means of migration from traditional access control systems to RBAC, different role mining algorithms have been proposed in recent years for finding a minimal set of roles from existing user-permission assignments. While determining such roles, it is often required that certain security objectives are satisfied. A common goal is to enforce the role-usage cardinality constraint, which limits the maximum number of roles any user can have. In this paper, we propose two alternative approaches for role mining with an upper bound on the number of roles that can be assigned to each user, and validate their performance with benchmark data sets. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

John, J. C., Sural, S., Atluri, V., & Vaidya, J. S. (2012). Role mining under role-usage cardinality constraint. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 150–161). Springer New York LLC. https://doi.org/10.1007/978-3-642-30436-1_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free