Aarhus University Seal

Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints

Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

DOI

  • Carlo Blundo, University of Salerno
  • ,
  • Stelvio Cimato, University of Milan
  • ,
  • Luisa Siniscalchi

Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other softwares. The migration process towards RBAC, starting from the current access configuration, relies on the design of role mining techniques, whose aim is to define suitable roles that implement the given access policies. Some constraints can be used to transform the roles automatically output by the mining procedures and effectively capture the organization's status under analysis. Such constraints can limit the final configuration characteristics, such as the number of roles assigned to a user, or the number of permissions included in a role, and produce a resulting role set that is effectively usable in real-world situations. In this paper, we consider two constraints: The number of permissions a role can include and the number of roles assigned to any user. In particular, we present two heuristics that produce roles compliant with both constraints and evaluate their performances using both real-world and synthetic datasets.

Original languageEnglish
JournalComputer Journal
Volume65
Issue6
Pages (from-to)1386-1411
Number of pages26
ISSN0010-4620
DOIs
Publication statusPublished - Jun 2022

    Research areas

  • access control, constrained role mining, heuristics, RBAC

See relations at Aarhus University Citationformats

ID: 279968062