Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints

Carlo Blundo*, Stelvio Cimato, Luisa Siniscalchi

*Corresponding author af dette arbejde

Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

Abstract

Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other softwares. The migration process towards RBAC, starting from the current access configuration, relies on the design of role mining techniques, whose aim is to define suitable roles that implement the given access policies. Some constraints can be used to transform the roles automatically output by the mining procedures and effectively capture the organization's status under analysis. Such constraints can limit the final configuration characteristics, such as the number of roles assigned to a user, or the number of permissions included in a role, and produce a resulting role set that is effectively usable in real-world situations. In this paper, we consider two constraints: The number of permissions a role can include and the number of roles assigned to any user. In particular, we present two heuristics that produce roles compliant with both constraints and evaluate their performances using both real-world and synthetic datasets.

OriginalsprogEngelsk
TidsskriftThe Computer Journal
Vol/bind65
Nummer6
Sider (fra-til)1386-1411
Antal sider26
ISSN0010-4620
DOI
StatusUdgivet - jun. 2022

Fingeraftryk

Dyk ned i forskningsemnerne om 'Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints'. Sammen danner de et unikt fingeraftryk.

Citationsformater