...
首页> 外文期刊>Computers & Security >A business-driven decomposition methodology for role mining
【24h】

A business-driven decomposition methodology for role mining

机译:一种业务驱动的角色挖掘分解方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

It is generally accepted that role mining - that is, the discovery of roles through the automatic analysis of data from existing access control systems - must count on business requirements to increase its effectiveness. Indeed, roles elicited without leveraging on business information are unlikely to be intelligible by system administrators. A business-oriented categorization of users and permissions (e.g., organizational units, job titles, cost centers, business processes, etc.) could help administrators identify the job profiles of users and, as a consequence, which roles should be assigned to them. Nonetheless, most of the existing role mining techniques yield roles that have no clear relationship with the business structure of the organization where the role mining is being applied. To face this problem, we propose a methodology that allows role engineers to leverage business information during the role finding process. The key idea is decomposing the dataset to analyze into several partitions, in a way that each partition is homogeneous from a business perspective. Each partition groups users or permissions with the same business categorization (e.g., all the users belonging to the same department, or all the permissions that support the execution of the same business process). Such partitions are then role-mined independently, hence achieving three main results: (1) elicited roles have a clearer relationship with business information; (2) mining algorithms do not seek to find commonalities among users with fundamentally different job profiles or among uncorre-lated permissions; and, (3) any role mining algorithm can be used in conjunction with our approach. When several business attributes are available, analysts need to figure out which one produces the decomposition that leads to the most intelligible roles. In this paper, we describe three indexes that drive the decomposition process by measuring the quality of a given decomposition: entrustability, minability gain, and similarity gain. We compare these indexes, pointing out pros and cons. Finally, we apply our methodology on real enterprise data, showing its effectiveness and efficiency in supporting role engineering.
机译:人们普遍认为角色挖掘(即通过自动分析现有访问控制系统中的数据来发现角色)必须依靠业务需求来提高其有效性。实际上,在不利用业务信息的情况下获得的角色不太可能被系统管理员理解。面向用户和权限的面向业务的分类(例如,组织单位,职务,成本中心,业务流程等)可以帮助管理员识别用户的职务概况,并因此确定应将哪些角色分配给他们。但是,大多数现有的角色挖掘技术产生的角色与应用角色挖掘的组织的业务结构没有明确的关系。为了解决这个问题,我们提出了一种方法,该方法允许角色工程师在角色查找过程中利用业务信息。关键思想是将数据集分解为多个分区,以使每个分区从业务角度看都是同质的。每个分区对用户或权限进行相同的业务分类(例如,属于同一部门的所有用户,或支持执行同一业务流程的所有权限)。然后,对这些分区进行独立的角色挖掘,从而获得三个主要结果:(1)引出的角色与业务信息之间的关系更加清晰; (2)挖掘算法不会寻求在根本不同工作档案的用户之间或在不相关权限之间找到共同点; (3)任何角色挖掘算法都可以与我们的方法结合使用。当有几个业务属性可用时,分析人员需要找出是哪个导致了最易懂的角色分解。在本文中,我们描述了通过测量给定分解的质量来驱动分解过程的三个指标:可委托性,可获性增益和相似性增益。我们比较这些指标,指出利弊。最后,我们将我们的方法应用于真实的企业数据,以显示其在支持角色工程中的有效性和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号