Title :
Towards role mining with restricted user-role assignment
Author :
Hingankar, Manisha ; Sural, Shamik
Author_Institution :
Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, India
fDate :
Feb. 28 2011-March 3 2011
Abstract :
RBAC (Role-Based Access Control) is a widely adopted access control model. However, migrating to RBAC requires identification of a complete and correct set of roles. Many bottom-up algorithms have been proposed for mining such roles. These algorithms attempt to find a minimal set of roles that is consistent with a given input configuration. But none of these consider any form of constraint on the maximum number of users that can be assigned to each role. This is a common requirement often termed as `cardinality constraint´ which has been widely referred in early RBAC literature. In this paper, we propose three algorithms which identify roles that satisfy such type of constraint. The algorithms vary in their degree of complexity and accuracy. Comparative performance analysis has been done using benchmark datasets.
Keywords :
access control; authorisation; RBAC; access control model; cardinality constraint; comparative performance analysis; restricted user-role assignment; role mining; role-based access control; Access control; Bipartite graph; Fires; Greedy algorithms; Optimization; Organizations; Constraint; RBAC; Role Engineering; Role Mining;
Conference_Titel :
Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4577-0786-5
DOI :
10.1109/WIRELESSVITAE.2011.5940855