Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the organization's security policies when migrating towards an RBAC system. In this paper, we examine different types of constraints addressing both theoretical aspects and practical considerations. On one side, we define the constrained role mining problem for each constraint type, showing its complexity. On the other hand, we present efficient heuristics adapted to each class of constraints, all derived from the specialization of a general approach for role mining. We show that our techniques improve over previous proposals, offering a complete set of experimentations obtained after the application of the heuristics to standard real-world datasets.
Managing constraints in role based access control / C. Blundo, S. Cimato, L. Siniscalchi. - In: IEEE ACCESS. - ISSN 2169-3536. - 8(2020 Aug), pp. 9146129.140497-9146129.140511.
|Titolo:||Managing constraints in role based access control|
CIMATO, STELVIO (Corresponding)
|Parole Chiave:||constrained role mining; RBAC; role mining|
|Settore Scientifico Disciplinare:||Settore INF/01 - Informatica|
Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni
|Data di pubblicazione:||ago-2020|
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1109/ACCESS.2020.3011310|
|Appare nelle tipologie:||01 - Articolo su periodico|