【24h】

Algorithms for Mining Meaningful Roles

机译:挖掘有意义角色的算法

获取原文

摘要

Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migrate from ACLs to RBAC can be a significant obstacle to adoption of RBAC. Hole mining algorithms partially automate the construction of an RBAC policy from an ACL policy and possibly other information, such a.s user attributes. These algorithms can significantly reduce the cost of migration to RBAC. This paper proposes new algorithms for role mining. The algorithms can easily be used to optimize a variety of policy quality metrics, including metrics based on policy size, metrics based on interpretability of the roles with respect: to user attribute data, and compound metrics thai consider size and interpretability. The algorithms all begin with a phase that constructs a set of candidate roles. We consider two strategies for the second phase: start with an empty policy and repeatedly add candidate roles, or start with the entire set of candidate roles and repeatedly remove roles. In experiments with publicly available access control policies, we find that the elimination approach produces better results, and that, for a policy quality metric that reflects size and interpretability, our elimination algorithm achieves significantly better results than previous work.
机译:基于角色的访问控制(RBAC)与低级访问控制策略表示形式(例如访问控制列表(ACL))相比,具有明显的优势。但是,大型组织从ACL迁移到RBAC所需的工作可能是采用RBAC的重大障碍。漏洞挖掘算法会根据ACL策略以及可能的其他信息(例如用户属性)部分自动执行RBAC策略的构建。这些算法可以大大降低迁移到RBAC的成本。本文提出了一种新的角色挖掘算法。该算法可轻松用于优化各种策略质量指标,包括基于策略大小的指标,基于角色相对于用户属性数据的可解释性的指标以及考虑规模和可解释性的复合指标。这些算法都从一个阶段开始,该阶段构造了一组候选角色。我们在第二阶段考虑两种策略:从空策略开始,重复添加候选角色,或者从整个候选角色集开始,重复删除角色。在使用公开可用的访问控制策略进行的实验中,我们发现消除方法产生了更好的结果,并且对于反映大小和可解释性的策略质量度量,我们的消除算法比以前的工作取得了明显更好的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号