Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints

Carlo Blundo*, Stelvio Cimato, Luisa Siniscalchi

*Corresponding author af dette arbejde

Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review


Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other softwares. The migration process towards RBAC, starting from the current access configuration, relies on the design of role mining techniques, whose aim is to define suitable roles that implement the given access policies. Some constraints can be used to transform the roles automatically output by the mining procedures and effectively capture the organization's status under analysis. Such constraints can limit the final configuration characteristics, such as the number of roles assigned to a user, or the number of permissions included in a role, and produce a resulting role set that is effectively usable in real-world situations. In this paper, we consider two constraints: The number of permissions a role can include and the number of roles assigned to any user. In particular, we present two heuristics that produce roles compliant with both constraints and evaluate their performances using both real-world and synthetic datasets.

TidsskriftThe Computer Journal
Sider (fra-til)1386-1411
Antal sider26
StatusUdgivet - jun. 2022


Dyk ned i forskningsemnerne om 'Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints'. Sammen danner de et unikt fingeraftryk.