A Formal Approach to the Role Mining Problem

A Formal Approach to the Role Mining Problem
Author :
Publisher :
Total Pages : 203
Release :
ISBN-10 : OCLC:693519046
ISBN-13 :
Rating : 4/5 (46 Downloads)

Book Synopsis A Formal Approach to the Role Mining Problem by : Qi Guo

Download or read book A Formal Approach to the Role Mining Problem written by Qi Guo and published by . This book was released on 2010 with total page 203 pages. Available in PDF, EPUB and Kindle. Book excerpt: Role-based access control (RBAC) has become the norm for enforcing security since it has been successfully implemented in various commercial systems. Roles, which are nothing but sets of permissions when semantics are unavailable, represent organizational agents that perform certain job functions within the organization. Role engineering, the process of defining a set of roles and associate permissions to them, is essential before all the benefits of RBAC can be realized. There are two basic approaches towards role engineering: top-down and bottom-up. The key problem with the top-down approach is that it is likely to ignore the existing permissions. In addition, the top-down approach calls for a good understanding among various authorities from different disciplines, which makes role engineering tedious, time consuming and very difficult to implement. In contrast, the bottom-up approach automates the role engineering process especially when business semantics are not available. Also, it starts from the existing permissions and aggregates them into roles. Therefore, role engineering by the bottom-up approach is also referred to as role mining. A number of approaches exist for role mining and majority of them employ clustering techniques or their variants to discover roles. An inherent problem with these approaches is that there is no formal notion of goodness/ interestingness of a role. They present heuristic ways to find a set of candidate roles. While offering justifications for the identified roles, there is no integrative view of the entire set of roles. For insightful bottom-up analysis, we need to define interestingness metrics for roles. The objective of this dissertation research is to formally define a list of role mining problems and find the solutions to solve them.


A Formal Approach to the Role Mining Problem Related Books

A Formal Approach to the Role Mining Problem
Language: en
Pages: 203
Authors: Qi Guo
Categories: Computer networks
Type: BOOK - Published: 2010 - Publisher:

DOWNLOAD EBOOK

Role-based access control (RBAC) has become the norm for enforcing security since it has been successfully implemented in various commercial systems. Roles, whi
Role Mining in Business
Language: en
Pages: 295
Authors: Roberto Di Pietro
Categories: Computers
Type: BOOK - Published: 2012 - Publisher: World Scientific

DOWNLOAD EBOOK

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies
Methodology for Hybrid Role Development
Language: en
Pages: 274
Authors: Ludwig Fuchs
Categories: Business & Economics
Type: BOOK - Published: 2010 - Publisher: BoD – Books on Demand

DOWNLOAD EBOOK

"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate internati
Security and Trust Management
Language: en
Pages: 330
Authors: Audun Jøsang
Categories: Computers
Type: BOOK - Published: 2013-04-22 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in
Trusted Systems
Language: en
Pages: 112
Authors: Roderick Bloem
Categories: Computers
Type: BOOK - Published: 2013-11-25 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria