The role mining problem: finding a minimal descriptive set of roles

J Vaidya, V Atluri, Q Guo - Proceedings of the 12th ACM symposium on …, 2007 - dl.acm.org
Devising a complete and correct set of roles has been recognized as one of the most
important and challenging tasks in implementing role based access control. A key problem …

Roleminer: mining roles using subset enumeration

J Vaidya, V Atluri, J Warner - Proceedings of the 13th ACM conference …, 2006 - dl.acm.org
Role engineering, the task of defining roles and associating permissions to them, is
essential to realize the full benefits of the role-based access control paradigm. Essentially …

Optimal boolean matrix decomposition: Application to role engineering

H Lu, J Vaidya, V Atluri - 2008 IEEE 24th International …, 2008 - ieeexplore.ieee.org
A decomposition of a binary matrix into two matrices gives a set of basis vectors and their
appropriate combination to form the original matrix. Such decomposition solutions are useful …

Roles in information security–a survey and classification of the research area

L Fuchs, G Pernul, R Sandhu - computers & security, 2011 - Elsevier
The concept of roles has been prevalent in the area of Information Security for more than 15
years already. It promises simplified and flexible user management, reduced administrative …

Role engineering using graph optimisation

D Zhang, K Ramamohanarao, T Ebringer - Proceedings of the 12th ACM …, 2007 - dl.acm.org
Role engineering is one of the fundamental phases for migrating existing enterprises to Role
Based Access Control. In organisations with a large number of users and permissions, this …

[PDF][PDF] A framework for modeling privacy requirements in role engineering

Q He, AI Antón - Proc. of REFSQ, 2003 - crinfo.univ-paris1.fr
Privacy protection is important in many industries, such as healthcare and finance.
Capturing and modeling privacy requirements in the early stages of system development is …

The role mining problem: A formal perspective

J Vaidya, V Atluri, Q Guo - ACM Transactions on Information and System …, 2010 - dl.acm.org
Devising a complete and correct set of roles has been recognized as one of the most
important and challenging tasks in implementing role-based access control. A key problem …

Security for enterprise resource planning systems

W She, B Thuraisingham - Information Systems Security, 2007 - Taylor & Francis
Enterprise Resource Planning (ERP) is the technology that provides the unified business
function to the organization by integrating the core processes. ERP now is experiencing the …

Policy Engineering in RBAC and ABAC

S Das, B Mitra, V Atluri, J Vaidya, S Sural - … Jajodia on the Occasion of His …, 2018 - Springer
Abstract Role-based Access Control (RBAC) and Attribute-based access control (ABAC) are
the most widely used access control models for mediating controlled access to resources in …

A cost-driven approach to role engineering

A Colantonio, R Di Pietro, A Ocello - … of the 2008 ACM symposium on …, 2008 - dl.acm.org
In recent years role-based access control (RBAC) has been spreading within organizations.
However, companies still have considerable difficulty migrating to this model, due to the …