【24h】

Algorithms for Mining Meaningful Roles

机译:用于挖掘有意义的角色的算法

获取原文

摘要

Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migrate from ACLs to RBAC can be a significant obstacle to adoption of RBAC. Hole mining algorithms partially automate the construction of an RBAC policy from an ACL policy and possibly other information, such a.s user attributes. These algorithms can significantly reduce the cost of migration to RBAC. This paper proposes new algorithms for role mining. The algorithms can easily be used to optimize a variety of policy quality metrics, including metrics based on policy size, metrics based on interpretability of the roles with respect: to user attribute data, and compound metrics thai consider size and interpretability. The algorithms all begin with a phase that constructs a set of candidate roles. We consider two strategies for the second phase: start with an empty policy and repeatedly add candidate roles, or start with the entire set of candidate roles and repeatedly remove roles. In experiments with publicly available access control policies, we find that the elimination approach produces better results, and that, for a policy quality metric that reflects size and interpretability, our elimination algorithm achieves significantly better results than previous work.
机译:基于角色的访问控制(RBAC)在较低级别访问控制策略表示中提供了显着的优势,例如访问控制列表(ACL)。但是,大型组织迁移到R​​BAC的大型组织所需的努力可能是采用RBAC的重要障碍。孔挖掘算法部分自动化从ACL政策和可能的其他信息构建RBAC策略,这样A.S用户属性。这些算法可以显着降低迁移到RBAC的成本。本文提出了用于角色挖掘的新算法。该算法可以很容易地用于优化各种策略质量指标,包括基于策略大小的指标,基于角色的可解释性的指标:对用户属性数据,复合度量泰语考虑大小和解释性。该算法均以构建一组候选角色的阶段开始。我们考虑了第二阶段的两个策略:从空策略开始,然后重复添加候选角色,或者从整套候选角色开始,并重复删除角色。在具有公开的访问控制政策的实验中,我们发现消除方法产生了更好的结果,并且对于反映尺寸和解释性的策略质量指标,我们的消除算法比以前的工作得出显着更好的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号