期刊文献+

Permission and role automatic assigning of user in role-based access control 被引量:4

Permission and role automatic assigning of user in role-based access control
下载PDF
导出
摘要 Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. Role mining and setup affect the usage of role-based access control (RBAC). Traditionally, user's role and permission assigning are manipulated by security administrator of system. However, the cost is expensive and the operating process is complex. A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems. The relation among sets of permissions, roles and! users was explored by generating mappings, and the relation between sets of users and attributes was analyzed by means of the concept lattice model, generating a critical mapping between the attribute and permission sets, and making the meaning of the role natural and operational. Thus, a role is determined by permission set and user's attributes. The generated mappings were used to automatically assign permissions and roles to new users. Experimental results show that the proposed algorithm is effective and efficient,
出处 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页 中南大学学报(英文版)
基金 Project(61003140) supported by the National Natural Science Foundation of China Project(013/2010/A) supported by Macao Science and Technology Development Fund Project(10YJC630236) supported by Social Science Foundation for the Youth Scholars of Ministry of Education of China
关键词 基于角色的访问控制 控制权限 用户 自动分配 操纵系统 属性集 RBAC 权限分配 role-based access control role permission assignment concept lattice
  • 相关文献

参考文献4

二级参考文献67

共引文献482

同被引文献18

  • 1Mehdi Kaytoue,Sergei O. Kuznetsov,Amedeo Napoli,Sébastien Duplessis.Mining gene expression data with pattern structures in formal concept analysis[J].Information Sciences.2011(10)
  • 2Vaidya J,Afluri V,Guo Q. The role mining problem:finding a minimal descriptive set of roles[A]. Proceedings of the 12th ACM symposium on Access control models and technologies [C] .New York:ACM,2007. 175- 184.
  • 3Vaidya J, Afluri V, Gun Q, et al. Edge-rmp: Minimizing admin- istrative assignments for role-based access control [J]. Journal of Computer Security, 2009,17 (2) 211 - 235.
  • 4Lu H, Vaidya J, Afluri V. Optimal boolean malrix decomposi- tion: Application to role engineering [ A ]. IEEE 24th Interna- tional Conference on Data Engineefing [C ]. Piscataway: 1EEE, 2008.297 - 306.
  • 5Ene A, Home W, Milosavljevic N, et al. Fast exact and heuris- tic methods for role minimization problems[ A]. Proceedings of the 13th ACM symposium on Access control models and tech- nologies[ C] .New York: ACM,2008.1- 10.
  • 6Zhang D, Ramamohanarao K, Ebringer T. Role engineering us- ing graph opfimisationl A] .Proceedings of the 12th ACM sym- posium on Access control models and technologies [ C ]. New York: ACM,2007.139 - 144.
  • 7Ganter B, Wille R. Formal Concept Analysis: Mathematical Foundations[ M]. Berlin: Springer, 1999.
  • 8Sobieski , Zielifiski B. Modelling role hierarchy smacture using the formal concept analysis[J]. Annales UMCS, Informatica, 2010,10(2) : 143 - 159.
  • 9Wang Jian, Zeng Cheng, He Chuan, Hong Liang, et al. Con- text-aware role mining for mobile service recommendation[ A ]. Proceedings of the 27th Annual ACM Symposium on Applied Computing[ C ]. New York: ACM, 2012.173 - 178.
  • 10Gauthier F, Merlo E. Investigation of access control models with formal concept analysis: A ca study [ A ] 2012 16th Eu- ropean Conference on Software Maintenance and Reengineer- ing(CSMR) [ C ]. Piscataway: IEEE, 2012.397 - 402.

引证文献4

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部