Current Web-based applications use XML-based formats to represent user descriptions exchanged between parties of a distributed computation. This paper introduces some techniques for extracting frequent patterns of user attributes from this XML flow. Then, patterns are used for bottom-up construction of a role ontology, which is then passed to an ontology engineer for a final pruning. The result is a user ontology built by combining top-down and bottom-up approaches, supporting extraction and validation of knowledge about "typical" users particularly suitable for fine grained access control applications.

Extracting role hierarchies from authentication data flows / P. Ceravolo. - In: COMPUTER SYSTEMS SCIENCE AND ENGINEERING. - ISSN 0267-6192. - 19:3(2004 May), pp. 121-127.

Extracting role hierarchies from authentication data flows

P. Ceravolo
Primo
2004

Abstract

Current Web-based applications use XML-based formats to represent user descriptions exchanged between parties of a distributed computation. This paper introduces some techniques for extracting frequent patterns of user attributes from this XML flow. Then, patterns are used for bottom-up construction of a role ontology, which is then passed to an ontology engineer for a final pruning. The result is a user ontology built by combining top-down and bottom-up approaches, supporting extraction and validation of knowledge about "typical" users particularly suitable for fine grained access control applications.
Data flow; Role hierarchies; XML flow
Settore INF/01 - Informatica
mag-2004
Article (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/33607
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 1
social impact