On the Definition of Role Mining

被引:33
作者
Frank, Mario [1 ]
Buhmann, Joachim M. [1 ]
Basin, David [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2010年
关键词
RBAC; Role Engineering; Role Mining;
D O I
10.1145/1809842.1809851
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem. In this paper, we provide a detailed analysis of the requirements for role mining, the existing definitions of role mining, and the methods used to assess role mining results. Given basic assumptions on how access-control configurations are generated, we propose a novel definition of the role mining problem that fulfills the requirements that real-world enterprises typically have. In this way, we recast role mining as a prediction problem.
引用
收藏
页码:35 / 44
页数:10
相关论文
共 31 条
[1]  
[Anonymous], SEC 08
[2]  
[Anonymous], 1996, P 1 ACM WORKSHOP ROL
[3]  
[Anonymous], 2007, ROLE MINING ENG OPTI
[4]  
[Anonymous], IEEE T DEPENDABLE SE
[5]  
[Anonymous], SACMAT 09
[6]  
[Anonymous], ACSAC 01 WASH DC US
[7]  
[Anonymous], SAC 08 FORT BRAZ
[8]  
[Anonymous], 2009, P 26 ANN INT C MACH, DOI DOI 10.1145/1553374.1553498
[9]  
[Anonymous], ACSAC 09 LOS AL CA U
[10]  
[Anonymous], CCS 09