Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in '90 years aiming at simplifying the management of centralized access control. The definition of a good set of roles in order to match the organizational requirements of a company is a problem partially solved by role mining techniques, which return automatically a set of roles compatible with the permissions assigned to users. Unfortunately, the problem of finding an optimal role set has been proved to be NP-hard; so heuristics have been introduced in order to approximate the optimal solution. In this work we propose a novel heuristic and compare its results showing its efficiency and effectiveness.
A simple role mining algorithm / C. Blundo, S. Cimato - In: Proceedings of the 2010 ACM symposium on applied computing : Sierre, Switzerland, march 22-26, 2010New York : Association for computer machinery, 2010. - ISBN 9781605586380. - pp. 1958-1962 (( Intervento presentato al 25. convegno Symposium on Applied Computing tenutosi a Sierre, Switzerland nel 2010.
|Titolo:||A simple role mining algorithm|
CIMATO, STELVIO (Ultimo)
|Parole Chiave:||Role mining.|
|Settore Scientifico Disciplinare:||Settore INF/01 - Informatica|
|Data di pubblicazione:||2010|
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1145/1774088.1774503|
|Tipologia:||Book Part (author)|
|Appare nelle tipologie:||03 - Contributo in volume|