...
首页> 外文期刊>Journal of Theoretical and Applied Information Technology >ASSESSING ROLE MINING ALGORITHMS USING RMINER TOOL IN IDENTIFYING THE BEST MODEL FOR ACCESS CONTROL
【24h】

ASSESSING ROLE MINING ALGORITHMS USING RMINER TOOL IN IDENTIFYING THE BEST MODEL FOR ACCESS CONTROL

机译:使用Rminer工具评估角色挖掘算法以确定最佳的访问控制模型

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Role-based access control model has been accepted by many organizations because of the security feature that the model offers. Generally, role-based access control executes based on a role which includes set of permissions that built in a matrix form and the advantage of this model is the flexibility to modify or reassign the roles of a user if the permissions are changed. However, one of the main challenges in designing and executing the role-based access control model is to define a complete and correct set of roles and assigning them with permissions and therefore to solve this problem, the researchers have proposed role mining algorithms to produce such role set. Moreover, there are only a few comprehensive studies have been carried out to compare these algorithms and the evaluations are usually using different dataset and evaluation criteria. In order to give the researcher some insights into their performances, this paper presents an analysis on some of the well-known role mining algorithms by using RMiner tool that can be applied for role mining process and deliberate some of the dataset that can be used in role mining environment.
机译:基于角色的访问控制模型已被许多组织接受,因为该模型提供了安全性功能。通常,基于角色的访问控制是基于一个角色执行的,该角色包括以矩阵形式构建的一组权限,并且该模型的优点是,如果更改了权限,则可以灵活地修改或重新分配用户的角色。但是,设计和执行基于角色的访问控制模型时的主要挑战之一是定义一组完整且正确的角色并为其分配权限,因此,为了解决此问题,研究人员提出了一种角色挖掘算法来产生这种角色。角色集。此外,仅进行了很少的综合研究以比较这些算法,并且评估通常使用不同的数据集和评估标准。为了使研究人员对他们的表现有一些见识,本文使用RMiner工具对一些著名的角色挖掘算法进行了分析,该工具可应用于角色挖掘过程,并审议一些可用于数据挖掘的数据集。角色挖掘环境。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号