Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints

Carlo Blundo*, Stelvio Cimato, Luisa Siniscalchi

*Corresponding author for this work

Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

Abstract

Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other softwares. The migration process towards RBAC, starting from the current access configuration, relies on the design of role mining techniques, whose aim is to define suitable roles that implement the given access policies. Some constraints can be used to transform the roles automatically output by the mining procedures and effectively capture the organization's status under analysis. Such constraints can limit the final configuration characteristics, such as the number of roles assigned to a user, or the number of permissions included in a role, and produce a resulting role set that is effectively usable in real-world situations. In this paper, we consider two constraints: The number of permissions a role can include and the number of roles assigned to any user. In particular, we present two heuristics that produce roles compliant with both constraints and evaluate their performances using both real-world and synthetic datasets.

Original languageEnglish
JournalThe Computer Journal
Volume65
Issue6
Pages (from-to)1386-1411
Number of pages26
ISSN0010-4620
DOIs
Publication statusPublished - Jun 2022

Keywords

  • access control
  • constrained role mining
  • heuristics
  • RBAC

Fingerprint

Dive into the research topics of 'Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints'. Together they form a unique fingerprint.

Cite this