首页> 外文会议>IEEE Military Communications Conference >Hunting abnormal configurations for permission-sensitive role mining
【24h】

Hunting abnormal configurations for permission-sensitive role mining

机译:寻找异常配置以进行权限敏感的角色挖掘

获取原文

摘要

Migrating traditional access control into Role Based Access Control (RBAC) lightens us a practical way to improve the management efficiency while maintaining system security. However, since security and reliability of RBAC are mostly depending on the quality of roles, how to find proper roles is a challenging problem. However, few existing approaches have taken abnormal configurations in the original data into consideration, these abnormal configurations always lead to wrong roles and thus cause tremendous security risks. To address this problem, we propose a novel role mining framework considering user similarities and abnormal configurations, simultaneously. Specifically, we propose a novel spectral clustering algorithm based on a newly designed similarity function. Then an abnormal configuration hunting method is proposed to target potential abnormal assignments and give recommendations to correct these configurations based on clustering results. Experimental results show its performance over existing solutions.
机译:将传统访问控制迁移到基于角色的访问控制(RBAC)中,为我们提供了一种在保持系统安全性的同时提高管理效率的实用方法。但是,由于RBAC的安全性和可靠性主要取决于角色的质量,因此如何找到合适的角色是一个具有挑战性的问题。但是,很少有现有的方法考虑原始数据中的异常配置,这些异常配置总是导致错误的角色,从而造成巨大的安全风险。为了解决这个问题,我们提出了一种同时考虑用户相似性和异常配置的新颖的角色挖掘框架。具体来说,我们提出了一种基于新设计的相似度函数的新颖频谱聚类算法。然后提出了一种异常配置搜寻方法,以针对潜在的异常分配,并根据聚类结果给出建议以纠正这些配置。实验结果表明其性能优于现有解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号