The role mining problem: finding a minimal descriptive set of roles
Devising a complete and correct set of roles has been recognized as one of the most
important and challenging tasks in implementing role based access control. A key problem …
important and challenging tasks in implementing role based access control. A key problem …
Roleminer: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is
essential to realize the full benefits of the role-based access control paradigm. Essentially …
essential to realize the full benefits of the role-based access control paradigm. Essentially …
Optimal boolean matrix decomposition: Application to role engineering
A decomposition of a binary matrix into two matrices gives a set of basis vectors and their
appropriate combination to form the original matrix. Such decomposition solutions are useful …
appropriate combination to form the original matrix. Such decomposition solutions are useful …
Roles in information security–a survey and classification of the research area
The concept of roles has been prevalent in the area of Information Security for more than 15
years already. It promises simplified and flexible user management, reduced administrative …
years already. It promises simplified and flexible user management, reduced administrative …
Role engineering using graph optimisation
D Zhang, K Ramamohanarao, T Ebringer - Proceedings of the 12th ACM …, 2007 - dl.acm.org
Role engineering is one of the fundamental phases for migrating existing enterprises to Role
Based Access Control. In organisations with a large number of users and permissions, this …
Based Access Control. In organisations with a large number of users and permissions, this …
[PDF][PDF] A framework for modeling privacy requirements in role engineering
Q He, AI Antón - Proc. of REFSQ, 2003 - crinfo.univ-paris1.fr
Privacy protection is important in many industries, such as healthcare and finance.
Capturing and modeling privacy requirements in the early stages of system development is …
Capturing and modeling privacy requirements in the early stages of system development is …
The role mining problem: A formal perspective
Devising a complete and correct set of roles has been recognized as one of the most
important and challenging tasks in implementing role-based access control. A key problem …
important and challenging tasks in implementing role-based access control. A key problem …
Security for enterprise resource planning systems
W She, B Thuraisingham - Information Systems Security, 2007 - Taylor & Francis
Enterprise Resource Planning (ERP) is the technology that provides the unified business
function to the organization by integrating the core processes. ERP now is experiencing the …
function to the organization by integrating the core processes. ERP now is experiencing the …
Policy Engineering in RBAC and ABAC
Abstract Role-based Access Control (RBAC) and Attribute-based access control (ABAC) are
the most widely used access control models for mediating controlled access to resources in …
the most widely used access control models for mediating controlled access to resources in …
A cost-driven approach to role engineering
A Colantonio, R Di Pietro, A Ocello - … of the 2008 ACM symposium on …, 2008 - dl.acm.org
In recent years role-based access control (RBAC) has been spreading within organizations.
However, companies still have considerable difficulty migrating to this model, due to the …
However, companies still have considerable difficulty migrating to this model, due to the …