Mining approximate roles under important assignment

Ning Pan, Zhiqiang Zhu, Liangsheng He, Lei Sun, Hang Su
{"title":"Mining approximate roles under important assignment","authors":"Ning Pan, Zhiqiang Zhu, Liangsheng He, Lei Sun, Hang Su","doi":"10.1109/COMPCOMM.2016.7924918","DOIUrl":null,"url":null,"abstract":"Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be very important because the user-permission assignment relationships are dynamic. This paper defines the δ-Approx Important Role Mining Problem (d-IRMP) which is proved to be NP-complete and proposes a heuristic bottom-up role mining algorithm that reduces the total number of roles with important assignments preserved at first. Furthermore, experiments were carried out with publicly available datasets to evaluate the approach and the results compared with other algorithms demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7924918","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be very important because the user-permission assignment relationships are dynamic. This paper defines the δ-Approx Important Role Mining Problem (d-IRMP) which is proved to be NP-complete and proposes a heuristic bottom-up role mining algorithm that reduces the total number of roles with important assignments preserved at first. Furthermore, experiments were carried out with publicly available datasets to evaluate the approach and the results compared with other algorithms demonstrate the effectiveness of the proposed algorithm.
挖掘重要任务下的近似角色
基于角色的访问控制(RBAC)近年来已成为事实上的访问控制模型。为了部署RBAC,组织必须从现有的用户权限分配关系中定义一组角色,这个过程称为角色挖掘。由于用户-权限分配关系是动态的,因此已经提出了许多角色挖掘算法来设计完整和正确的角色集,这些角色集可能不是很重要。本文定义了证明np完全的δ-近似重要角色挖掘问题(d-IRMP),提出了一种启发式自底向上的角色挖掘算法,该算法首先减少保留重要分配的角色总数。此外,利用公开的数据集进行了实验来评估该方法,并将结果与其他算法进行了比较,证明了该算法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信