Constrained role mining aims to define a valid set of roles efficiently representing the organization of a company, easing the management of the security policies. Since the associated problems are NP hard, usually some heuristics are defined to find some sub-optimal solutions. In this paper we define two heuristics for the Permission Distribution and Role Usage Cardinality Constraints in the post processing framework, i.e. refining the roles produced by some other algorithm. We discuss the performance of the proposed heuristics applying them to some standard datasets showing the improvements w.r.t. previously available solutions.
|Titolo:||PostProcessing in Constrained Role Mining|
|Settore Scientifico Disciplinare:||Settore INF/01 - Informatica|
|Data di pubblicazione:||2018|
|Digital Object Identifier (DOI):||10.1007/978-3-030-03493-1_22|
|Tipologia:||Book Part (author)|
|Appare nelle tipologie:||03 - Contributo in volume|