首页> 外文会议>International Conference on Progress in Informatics and Computing >An importance-based approach for mining approximate roles
【24h】

An importance-based approach for mining approximate roles

机译:基于重要性的挖掘近似角色的方法

获取原文

摘要

Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment (UPA) relationships are dynamic. In this paper, we define the evaluation criterion and the 6-Approx Important Role Mining Problem (6-IRMP) which is proved to be NP-complete first, then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions preserved. Furthermore, we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.
机译:近年来,基于角色的访问控制(RBAC)已成为事实上的访问控制模型。为了部署RBAC,组织必须从现有的用户权限分配关系中定义一组角色,该过程称为角色挖掘。提出了许多角色挖掘算法来设计一套完整而正确的角色,由于用户权限分配(UPA)关系是动态的,因此可能不必要。在本文中,我们定义了评估标准和首先被证明是NP完全的6-近似重要角色挖掘问题(6-IRMP),然后提出了一种启发式的自下而上角色挖掘方法,该方法减少了总的挖掘数量。保留重要任务和权限的角色。此外,我们使用公共数据集进行了实验,以评估我们的方法,并且与其他算法进行比较的实验结果证明了该方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号