首页> 外文期刊>Dependable and Secure Computing, IEEE Transactions on >Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition
【24h】

Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition

机译:通过扩展布尔矩阵分解的约束感知角色挖掘

获取原文
获取原文并翻译 | 示例
           

摘要

The role mining problem has received considerable attention recently. Among the many solutions proposed, the Boolean matrix decomposition (BMD) formulation has stood out, which essentially discovers roles by decomposing the binary matrix representing user-to-permission assignment (UPA) into two matrices—user-to-role assignment (UA) and permission-to-role assignment (PA). However, supporting certain embedded constraints, such as separation of duty (SoD) and exceptions, is critical to the role mining process. Otherwise, the mined roles may not capture the inherent constraints of the access control policies of the organization. None of the previously proposed role mining solutions, including BMD, take into account these underlying constraints while mining. In this paper, we extend the BMD so that it reflects such embedded constraints by proposing to allow negative permissions in roles or negative role assignments for users. Specifically, by allowing negative permissions in roles, we are often able to use less roles to reconstruct the same given user-permission assignments. Moreover, from the resultant roles we can discover underlying constraints such as separation of duty constraints. This feature is not supported by any existing role mining approaches. Hence, we call the role mining problem with negative authorizations the constraint-aware role mining problem (CRM). We also explore other interesting variants of the CRM, which may occur in real situations. To enable CRM and its variants, we propose a novel approach, extended Boolean matrix decomposition (EBMD), which addresses the ineffectiveness of BMD in its ability of capturing underlying constraints. We analyze the computational complexity for each of CRM variants and present heuristics for problems that are proven to be NP-hard.
机译:角色挖掘问题最近受到了广泛关注。在提出的众多解决方案中,布尔矩阵分解(BMD)公式非常引人注目,它通过将代表用户到权限分配(UPA)的二进制矩阵分解为两个矩阵(用户到角色分配(UA))来发现角色。和权限到角色分配(PA)。但是,支持某些嵌入式约束,例如职责分离(SoD)和异常,对于角色挖掘过程至关重要。否则,挖掘的角色可能无法捕获组织的访问控制策略的固有约束。先前提出的角色挖掘解决方案(包括BMD)都没有在挖掘时考虑到这些潜在的限制。在本文中,我们对BMD进行了扩展,以便通过提议允许角色的否定权限或用户的否定角色分配来反映这种嵌入式约束。具体来说,通过在角色中授予否定权限,我们通常可以使用更少的角色来重构相同的给定用户权限分配。此外,从产生的角色中,我们可以发现潜在的约束,例如职责约束的分离。任何现有的角色挖掘方法均不支持此功能。因此,我们将具有负授权的角色挖掘问题称为约束感知角色挖掘问题(CRM)。我们还将探讨CRM的其他有趣变体,这些变体可能在实际情况下发生。为了启用CRM及其变体,我们提出了一种新颖的方法,扩展布尔矩阵分解(EBMD),它解决了BMD捕获基本约束的能力方面的无效性。我们分析了每种CRM变体的计算复杂性,并提出了对证明是NP难的问题的启发式方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号