Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Managing constraints in role based access control

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Contributors:
      C. Blundo; S. Cimato; L. Siniscalchi
    • Publication Information:
      Institute of Electrical and Electronics Engineers
    • Publication Date:
      2020
    • Collection:
      The University of Milan: Archivio Istituzionale della Ricerca (AIR)
    • Abstract:
      Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the organization's security policies when migrating towards an RBAC system. In this paper, we examine different types of constraints addressing both theoretical aspects and practical considerations. On one side, we define the constrained role mining problem for each constraint type, showing its complexity. On the other hand, we present efficient heuristics adapted to each class of constraints, all derived from the specialization of a general approach for role mining. We show that our techniques improve over previous proposals, offering a complete set of experimentations obtained after the application of the heuristics to standard real-world datasets.
    • Relation:
      info:eu-repo/semantics/altIdentifier/wos/WOS:000556745100001; volume:8; firstpage:140497; lastpage:140511; numberofpages:15; journal:IEEE ACCESS; http://hdl.handle.net/2434/761124; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85089493824
    • Accession Number:
      10.1109/ACCESS.2020.3011310
    • Online Access:
      http://hdl.handle.net/2434/761124
      https://doi.org/10.1109/ACCESS.2020.3011310
    • Rights:
      info:eu-repo/semantics/openAccess
    • Accession Number:
      edsbas.BD2CBAD