DocumentCode :
3053056
Title :
Hybrid Role Mining for Security Service Solution
Author :
Mandala, Supreet ; Vukovic, Maja ; Laredo, Jim ; Ruan, Yaoping ; Hernandez, Milton
Author_Institution :
Penn State Univ., State College, PA, USA
fYear :
2012
fDate :
24-29 June 2012
Firstpage :
210
Lastpage :
217
Abstract :
IT services delivery is a complex ecosystem that engages 100000s of system administrators in service delivery centers globally managing 1000s of IT systems on behalf of customers. Such large-scale hosting environments require a flexible identity management system to provision necessary access rights, in order to ensure compliance posture of an organization. A popular and effective access control scheme is Role Based Access Control (RBAC). Ideally, a role should correspond to a business function performed within an enterprise. Several role mining algorithms have been proposed which attempt to automate the process of role discovery. In this paper, we represent the user-permission assignments as a bi-partite graph with users/permissions as vertices and user-permission assignments as edges. Given a user-permission bi-partite graph, most role mining algorithms focus on discovering roles that cover all the user-permission assignments. We show that by relaxing the coverage requirement, one can improve the accuracy of role detection. We propose a parameterized definition of a role based on graph theoretical properties, and demonstrate that the role parameters can be controlled to balance the accuracy and coverage of the roles detected. Finally, we propose a heuristic to illustrate the efficacy of our approach and validate it on real and artificial organizational access control data.
Keywords :
authorisation; business data processing; data mining; graph theory; IT services delivery; IT systems; RBAC; artificial organizational access control data; business function; enterprise; graph theoretical properties; hybrid role mining; identity management system; real organizational access control data; role based access control; role detection; role discovery process; security service solution; service delivery centers; user-permission assignments; user-permission bipartite graph; Access control; Accuracy; Algorithm design and analysis; Data mining; Organizations; Permission; Graph Theory; RBAC; Role Mining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Services Computing (SCC), 2012 IEEE Ninth International Conference on
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4673-3049-7
Type :
conf
DOI :
10.1109/SCC.2012.57
Filename :
6274146
Link To Document :
بازگشت