Abstract
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to user-permission assignments identified in the second step. We formally show - the proofs of our results are rooted in graph theory - that this methodology allows role engineers for the elicitation of stable candidate roles, by contextually simplifying the role selection task. Efficient algorithms to implement our strategy are also described. Further, we discuss practical applications of our approach. Finally, we tested our methodology on real dataset. Results achieved confirm both the viability of our proposal and the analytical findings. © 2009 Elsevier Ltd. All rights reserved.
Original language | English (US) |
---|---|
Pages (from-to) | 548-564 |
Number of pages | 17 |
Journal | Computers and Security |
Volume | 29 |
Issue number | 5 |
DOIs | |
State | Published - Jul 1 2010 |
Externally published | Yes |
Bibliographical note
Generated from Scopus record by KAUST IRTS on 2023-09-20ASJC Scopus subject areas
- Law
- General Computer Science