DocumentCode :
1943992
Title :
Permission Set Mining: Discovering Practical and Useful Roles
Author :
Zhang, Dana ; Ramamohanarao, Kotagiri ; Ebringer, Tim ; Yann, Trevor
Author_Institution :
Univ. of Melbourne, Melbourne, VIC
fYear :
2008
fDate :
8-12 Dec. 2008
Firstpage :
247
Lastpage :
256
Abstract :
Role based access control is an efficient and effective way to manage and govern permissions to a large number of users. However, defining a role infrastructure that accurately reflects the internal functionalities and workings of a large enterprise is a challenging task. Recent research has focused on the theoretical components of automated role identification while practical applications for identifying roles remain unsolved.This research proposes a practical data mining heuristic method that is fast, scalable and capable of identifying comprehensive roles and placing them into a hierarchy. Permission set pattern data mining can be used to identify the roles with partial orderings that cover the largest portion of user permissions within a system. We test the algorithm on real user permission assignments as well as on generated data sets. Roles identified in test sets cover up to 85% of user permissions and analysis show the roles offer significant administrative benefit. We find interesting correlations between roles and their relationships and analyse the tradeoffs between identifying roles with complete coverage to identifying roles that are most effective and offer significant administrative benefit.
Keywords :
authorisation; data mining; automated role identification; data mining heuristic method; data sets; partial orderings; permission set pattern data mining; role based access control; role infrastructure; user permission assignments; Access control; Application software; Computational complexity; Computer security; Concrete; Conference management; Data engineering; Data mining; Permission; Testing; Data Mining; Role Based Access Control; Role Engineering; Role Mining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
Conference_Location :
Anaheim, CA
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3447-3
Type :
conf
DOI :
10.1109/ACSAC.2008.21
Filename :
4721562
Link To Document :
بازگشت