[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1774088.1774503acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A simple role mining algorithm

Published: 22 March 2010 Publication History

Abstract

Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in '90 years aiming at simplifying the management of centralized access control. The definition of a good set of roles in order to match the organizational requirements of a company is a problem partially solved by role mining techniques, which return automatically a set of roles compatible with the permissions assigned to users. Unfortunately, the problem of finding an optimal role set has been proved to be NP-hard; so heuristics have been introduced in order to approximate the optimal solution. In this work we propose a novel heuristic and compare its results showing its efficiency and effectiveness.

References

[1]
C. Blundo and S. Cimato. A simple approach to role mining problem. Internal notes, 2009.
[2]
A. Bucker. Identity management design guide with ibm tivoli identity manager, 2005.
[3]
E. J. Coyne. Role engineering. In ACM Workshop on Role-Based Access Control, 1995.
[4]
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. E. Tarjan. Fast exact and heuristic methods for role minimization problems. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 1--10, USA, 2008.
[5]
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Transaction on Information System Security, 4(3):224--274, 2001.
[6]
M. Frank, D. A. Basin, and J. M. Buhmann. A class of probabilistic models for role engineering. In ACM Conference on Computer and Communications Security, pages 299--310. ACM, 2008.
[7]
Q. Guo, J. Vaidya, and V. Atluri. The role hierarchy mining problem: Discovery of optimal role hierarchies. In Computer Security Applications Conference, 2008. ACSAC 2008. Annual, pages 237--246, Dec. 2008.
[8]
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo. Mining roles with semantic meanings. In SACMAT '08, pages 21--30, New York, NY, USA, 2008.
[9]
I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo. Evaluating role mining algorithms. In B. Carminati and J. Joshi, eds, SACMAT, pp 95--104. ACM, 2009.
[10]
R. Schreiber. Datasets used for role mining experiments. http://www.hpl.hp.com/personal/Robert_Schreiber/
[11]
Scilab Consortium. Scilab: The open source platform for numerical computation. http://www.scilab.org/, Ver. 4--1 (for MacOS 10.4).
[12]
J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: finding a minimal descriptive set of roles. In SACMAT '07, pages 175--184, New York, NY, USA, 2007. ACM.
[13]
J. Vaidya, V. Atluri, and J. Warner. Roleminer: mining roles using subset enumeration. In CCS '06, pages 144--153, New York, NY, USA, 2006. ACM.
[14]
D. Zhang, K. Ramamohanarao, and T. Ebringer. Role engineering using graph optimisation. In SACMAT '07, pages 139--144, New York, NY, USA, 2007. ACM.

Cited By

View all
  • (2024)Studies on Multi-objective Role Mining in ERP SystemsEvolutionary Computation in Combinatorial Optimization10.1007/978-3-031-57712-3_6(81-96)Online publication date: 2024
  • (2023)Dynamic Optimization of Role Concepts for Role-Based Access Control Using Evolutionary AlgorithmsSN Computer Science10.1007/s42979-023-01805-14:4Online publication date: 24-May-2023
  • (2023)Evolutionary Optimization of Roles for Access Control in Enterprise Resource Planning SystemsComputational Intelligence10.1007/978-3-031-46221-4_1(1-23)Online publication date: 3-Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
March 2010
2712 pages
ISBN:9781605586397
DOI:10.1145/1774088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

SAC'10
Sponsor:
SAC'10: The 2010 ACM Symposium on Applied Computing
March 22 - 26, 2010
Sierre, Switzerland

Acceptance Rates

SAC '10 Paper Acceptance Rate 364 of 1,353 submissions, 27%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Studies on Multi-objective Role Mining in ERP SystemsEvolutionary Computation in Combinatorial Optimization10.1007/978-3-031-57712-3_6(81-96)Online publication date: 2024
  • (2023)Dynamic Optimization of Role Concepts for Role-Based Access Control Using Evolutionary AlgorithmsSN Computer Science10.1007/s42979-023-01805-14:4Online publication date: 24-May-2023
  • (2023)Evolutionary Optimization of Roles for Access Control in Enterprise Resource Planning SystemsComputational Intelligence10.1007/978-3-031-46221-4_1(1-23)Online publication date: 3-Nov-2023
  • (2022)Heuristics for constrained role mining in the post-processing frameworkJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-03648-114:8(9925-9937)Online publication date: 25-Jan-2022
  • (2022)Evolutionary Algorithms for the Constrained Two-Level Role Mining ProblemEvolutionary Computation in Combinatorial Optimization10.1007/978-3-031-04148-8_6(79-94)Online publication date: 4-Apr-2022
  • (2021)Role Mining Heuristics for Permission-Role-Usage Cardinality ConstraintsThe Computer Journal10.1093/comjnl/bxaa18665:6(1386-1411)Online publication date: 13-Feb-2021
  • (2020)Managing Constraints in Role Based Access ControlIEEE Access10.1109/ACCESS.2020.30113108(140497-140511)Online publication date: 2020
  • (2020)Role recommender-RBAC: Optimizing user-role assignments in RBACComputer Communications10.1016/j.comcom.2020.12.006Online publication date: Dec-2020
  • (2020)Role Mining: Survey and Suggestion on Role Mining in Access ControlMobile Internet Security10.1007/978-981-15-9609-4_4(34-50)Online publication date: 2-Nov-2020
  • (2018)The generalized temporal role mining problemJournal of Computer Security10.5555/2746188.274619023:1(31-58)Online publication date: 24-Dec-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media