Semantic analysis of role mining results and shadowed roles detection

Information Security Technical Report - Tập 17 - Trang 131-147 - 2013
Safaà Hachana1,2, Frédéric Cuppens3, Nora Cuppens-Boulahia1,3, Joaquin Garcia-Alfaro4
1Swid Web Performance Service, Rennes, France
2École Nationale Supérieure de Mécanique et d'Aérotechnique, LISI, Poitiers, France
3Institut Telecom-Mines/Telecom Bretagne, Dépt. LUSSI, Rennes, France
4Institut Telecom-Mines/TelecomSudParis, CNRS Samovar UMR 5157, Every, France

Tài liệu tham khảo

Ahn, 2007, Towards realizing a formal RBAC model in real systems, 215 Armando, 2012, Automated and efficient analysis of role-based access control with attributes, vol. 7371, 25 Armando, 2012, Efficient run-time solving of RBAC user authorization queries: pushing the envelope, 241 Barletta, 2011, Workflow and access control reloaded: a declarative specification framework for the automated analysis of web services, Scalable Computing: Practice and Experience, 12 Baumgrass, 2011, Deriving current state RBAC models from event logs, 667 Baumgrass, 2012, An approach to bridge the gap between role mining and role engineering via migration guides, 113 Colantonio, 2008, Leveraging lattices to improve role mining, 333 Colantonio, 2009, Mining stable roles in RBAC, 259 Colantonio, 2011, A new role mining framework to elicit business roles and to mitigate enterprise risk, Decision Support Systems, 50, 715, 10.1016/j.dss.2010.08.022 Ferraiolo, 2001 Frank, 2009, A probabilistic approach to hybrid role mining, 101 Frank, 2010, On the definition of role mining, 35 Fuchs, 2011, The role mining process model – underlining the need for a comprehensive research perspective, 35 Fuchs, 2011, Roles in information security – a survey and classification of the research area, Computers & Security, 30, 748, 10.1016/j.cose.2011.08.002 Gallaher, 2002 Goodstein, 2007 Hachana, 2012, Role mining to assist authorization governance: how far have we gone?, International Journal of Secure Software Engineering (IJSSE), 3 Hachana, 2012, Towards automated assistance for mined roles analysis in role mining applications, 123 Haidar, 2006, An extended RBAC profile of XACML, 13 Koyuturk, 2006, Nonorthogonal decomposition of binary matrices for bounded-error data compression and analysis, ACM Transactions on Mathematical Software, 32, 33, 10.1145/1132973.1132976 Kuhlmann, 2003, Role mining – revealing business roles for security administration using data mining technology, 179 Lee, 2000, Algorithms for non-negative matrix factorization, 556 Molloy, 2009, Evaluating role mining algorithms, 95 Molloy, 2010, Mining roles with noisy data, 45 Sandhu, 1996, Role-based access control model, IEEE Computer, 29, 38, 10.1109/2.485845 Streich, 2009, Multi-assignment clustering for Boolean data, 969 Takabi, 2010, StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy, 55 Vaidya, 2006, RoleMiner: mining roles using subset enumeration, 144 Vaidya, 2007, The role mining problem: finding a minimal descriptive set of roles, 175 Vaidya, 2008, Migrating to optimal RBAC with minimal perturbation, 11 Verde, 2012, Role engineering: from theory to practice, 181 Zhang, 2007, Role engineering using graph optimisation, 139