• DocumentCode
    1943992
  • Title

    Permission Set Mining: Discovering Practical and Useful Roles

  • Author

    Zhang, Dana ; Ramamohanarao, Kotagiri ; Ebringer, Tim ; Yann, Trevor

  • Author_Institution
    Univ. of Melbourne, Melbourne, VIC
  • fYear
    2008
  • fDate
    8-12 Dec. 2008
  • Firstpage
    247
  • Lastpage
    256
  • Abstract
    Role based access control is an efficient and effective way to manage and govern permissions to a large number of users. However, defining a role infrastructure that accurately reflects the internal functionalities and workings of a large enterprise is a challenging task. Recent research has focused on the theoretical components of automated role identification while practical applications for identifying roles remain unsolved.This research proposes a practical data mining heuristic method that is fast, scalable and capable of identifying comprehensive roles and placing them into a hierarchy. Permission set pattern data mining can be used to identify the roles with partial orderings that cover the largest portion of user permissions within a system. We test the algorithm on real user permission assignments as well as on generated data sets. Roles identified in test sets cover up to 85% of user permissions and analysis show the roles offer significant administrative benefit. We find interesting correlations between roles and their relationships and analyse the tradeoffs between identifying roles with complete coverage to identifying roles that are most effective and offer significant administrative benefit.
  • Keywords
    authorisation; data mining; automated role identification; data mining heuristic method; data sets; partial orderings; permission set pattern data mining; role based access control; role infrastructure; user permission assignments; Access control; Application software; Computational complexity; Computer security; Concrete; Conference management; Data engineering; Data mining; Permission; Testing; Data Mining; Role Based Access Control; Role Engineering; Role Mining;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 2008. ACSAC 2008. Annual
  • Conference_Location
    Anaheim, CA
  • ISSN
    1063-9527
  • Print_ISBN
    978-0-7695-3447-3
  • Type

    conf

  • DOI
    10.1109/ACSAC.2008.21
  • Filename
    4721562