Open Access Open Access  Restricted Access Subscription Access

RBAM with Constraint Satisfaction Problem in Role Mining


 

The main areas of research related to access control concern the identification of methodologies and models. With the ever-increasing number of users and IT systems, organizations have to manage large numbers users permissions in an efficient manner. Role-based access control is the most wide-spread access control model. Yet, companies still find it difficult to adopt RBAC because of the complexity of identifying a suitable set of roles. Roles must accurately reflect functions and responsibilities of users in the organization. When hundreds or thousands of users have individual access permissions, adopting the best approach to engineer roles saves time and money, and protects data and systems. Among all role engineering approaches, searching legacy access control systems to find de facto roles embedded in existing permissions is attracting an increasing interest. Data mining techniques can be used to automatically propose candidate roles, leading to a class of tools and methodologies referred to as role mining. The user role assignment is framed using RBAM algorithm with CSP Technique.

 


Keywords

RBAM, CSP, Role mining
User
Notifications
Font Size

Abstract Views: 135

PDF Views: 0




  • RBAM with Constraint Satisfaction Problem in Role Mining

Abstract Views: 135  |  PDF Views: 0

Authors

Abstract


The main areas of research related to access control concern the identification of methodologies and models. With the ever-increasing number of users and IT systems, organizations have to manage large numbers users permissions in an efficient manner. Role-based access control is the most wide-spread access control model. Yet, companies still find it difficult to adopt RBAC because of the complexity of identifying a suitable set of roles. Roles must accurately reflect functions and responsibilities of users in the organization. When hundreds or thousands of users have individual access permissions, adopting the best approach to engineer roles saves time and money, and protects data and systems. Among all role engineering approaches, searching legacy access control systems to find de facto roles embedded in existing permissions is attracting an increasing interest. Data mining techniques can be used to automatically propose candidate roles, leading to a class of tools and methodologies referred to as role mining. The user role assignment is framed using RBAM algorithm with CSP Technique.

 


Keywords


RBAM, CSP, Role mining