Current Web-based applications use XML-based formats to represent user descriptions exchanged between parties of a distributed computation. This paper introduces some techniques for extracting frequent patterns of user attributes from this XML flow. Then, patterns are used for bottom-up construction of a role ontology, which is then passed to an ontology engineer for a final pruning. The result is a user ontology built by combining top-down and bottom-up approaches, supporting extraction and validation of knowledge about "typical" users particularly suitable for fine grained access control applications.
Extracting role hierarchies from authentication data flows / P. Ceravolo. - In: COMPUTER SYSTEMS SCIENCE AND ENGINEERING. - ISSN 0267-6192. - 19:3(2004 May), pp. 121-127.
Extracting role hierarchies from authentication data flows
P. CeravoloPrimo
2004
Abstract
Current Web-based applications use XML-based formats to represent user descriptions exchanged between parties of a distributed computation. This paper introduces some techniques for extracting frequent patterns of user attributes from this XML flow. Then, patterns are used for bottom-up construction of a role ontology, which is then passed to an ontology engineer for a final pruning. The result is a user ontology built by combining top-down and bottom-up approaches, supporting extraction and validation of knowledge about "typical" users particularly suitable for fine grained access control applications.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.