TY - JOUR
T1 - Taming role mining complexity in RBAC
AU - Colantonio, Alessandro
AU - Di Pietro, Roberto
AU - Ocello, Alberto
AU - Verde, Nino Vincenzo
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2010/7/1
Y1 - 2010/7/1
N2 - In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to user-permission assignments identified in the second step. We formally show - the proofs of our results are rooted in graph theory - that this methodology allows role engineers for the elicitation of stable candidate roles, by contextually simplifying the role selection task. Efficient algorithms to implement our strategy are also described. Further, we discuss practical applications of our approach. Finally, we tested our methodology on real dataset. Results achieved confirm both the viability of our proposal and the analytical findings. © 2009 Elsevier Ltd. All rights reserved.
AB - In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to user-permission assignments identified in the second step. We formally show - the proofs of our results are rooted in graph theory - that this methodology allows role engineers for the elicitation of stable candidate roles, by contextually simplifying the role selection task. Efficient algorithms to implement our strategy are also described. Further, we discuss practical applications of our approach. Finally, we tested our methodology on real dataset. Results achieved confirm both the viability of our proposal and the analytical findings. © 2009 Elsevier Ltd. All rights reserved.
UR - https://linkinghub.elsevier.com/retrieve/pii/S0167404810000027
UR - http://www.scopus.com/inward/record.url?scp=77955716830&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2010.01.001
DO - 10.1016/j.cose.2010.01.001
M3 - Article
SN - 0167-4048
VL - 29
SP - 548
EP - 564
JO - Computers and Security
JF - Computers and Security
IS - 5
ER -