메뉴 건너뛰기




Volumn 55, Issue 1-2, 2012, Pages 87-96

Mining constraints in role-based access control

Author keywords

Constraint mining; Constraints; Role engineering; Role based access control (RBAC)

Indexed keywords

ARCHITECTURAL STRUCTURE; CONSTRAINTS; CONVENTIONAL DATA MINING; PERFORMANCE STUDY; ROLE ENGINEERING; ROLE-BASED ACCESS CONTROL; RULE MINING ALGORITHMS; SECURITY POLICY;

EID: 82755162050     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.01.053     Document Type: Article
Times cited : (23)

References (20)
  • 3
    • 4243280162 scopus 로고    scopus 로고
    • The economic impact of role-based access control, Planning report 02-1, National Institute of Standards and Technology
    • March
    • M.P. Gallagher, A. O'Connor, B. Kropp, The economic impact of role-based access control, Planning report 02-1, National Institute of Standards and Technology, March 2002.
    • (2002)
    • Gallagher, M.P.1    O'Connor, A.2    Kropp, B.3
  • 4
    • 0035790675 scopus 로고    scopus 로고
    • The role-based access control system of a European bank
    • a case study and discussion, in: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, USA
    • A. Schaad, J. Moffett, J. Jacob, The role-based access control system of a European bank: a case study and discussion, in: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001, pp. 3-9.
    • (2001) , pp. 3-9
    • Schaad, A.1    Moffett, J.2    Jacob, J.3
  • 5
    • 77954927281 scopus 로고    scopus 로고
    • Role mining based on weights, in
    • Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA
    • X. Ma, R. Li, Z. Lu, Role mining based on weights, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 65-74.
    • (2010)
    • Ma, X.1    Li, R.2    Lu, Z.3
  • 6
    • 82755168554 scopus 로고
    • Role engineering, in: Proc. 1th ACM Workshop on Role-Based Access Control
    • E.J. Coyne, Role engineering, in: Proc. 1th ACM Workshop on Role-Based Access Control, 1995.
    • (1995)
    • Coyne, E.J.1
  • 7
    • 34547237958 scopus 로고    scopus 로고
    • Roleminer: mining roles using subset enumeration, in:
    • Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA,
    • J. Vaidya, V. Atluri, J. Warner, Roleminer: mining roles using subset enumeration, in: Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006, pp. 144-153.
    • (2006) , pp. 144-153
    • Vaidya, J.1    Atluri, V.2    Warner, J.3
  • 8
    • 77954932478 scopus 로고    scopus 로고
    • On the definition of role mining, in
    • Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA
    • M. Frank, J.M. Buhmann, D. Basin, On the definition of role mining, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 35-44.
    • (2010) , pp. 35-44
    • Frank, M.1    Buhmann, J.M.2    Basin, D.3
  • 9
    • 30644478631 scopus 로고    scopus 로고
    • Role mining with ORCA, in:
    • Proc. 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden
    • J. Schlegelmilch, U. Steffens, Role mining with ORCA, in: Proc. 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, pp. 168-176.
    • (2005) , pp. 168-176
    • Schlegelmilch, J.1    Steffens, U.2
  • 10
    • 34547237958 scopus 로고    scopus 로고
    • Roleminer: mining roles using subset enumeration, in:
    • Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA,
    • J. Vaidya, V. Atluri, J. Warner, Roleminer: mining roles using subset enumeration, in: Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006, pp. 144-153.
    • (2006) , pp. 144-153
    • Vaidya, J.1    Atluri, V.2    Warner, J.3
  • 11
    • 57349105655 scopus 로고    scopus 로고
    • Mining roles with semantic meanings, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA
    • I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, J. Lobo, Mining roles with semantic meanings, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA, 2008, pp. 21-30.
    • (2008) , pp. 21-30
    • Molloy, I.1    Chen, H.2    Li, T.3    Wang, Q.4    Li, N.5    Bertino, E.6    Calo, S.7    Lobo, J.8
  • 12
    • 34548033731 scopus 로고    scopus 로고
    • Role engineering using graph optimisation
    • in: Proc. 12th ACM Symposium on Access Control Models and Technologies, Antipolis, France
    • D. Zhang, K. Ramamohanarao, T. Ebringer, Role engineering using graph optimisation, in: Proc. 12th ACM Symposium on Access Control Models and Technologies, Antipolis, France, 2007, pp. 139-144.
    • (2007) , pp. 139-144
    • Zhang, D.1    Ramamohanarao, K.2    Ebringer, T.3
  • 13
    • 57349100404 scopus 로고    scopus 로고
    • Fast exact and heuristic methods for role minimization problems, in:
    • Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA,
    • A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, R.E. Tarjan, Fast exact and heuristic methods for role minimization problems, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA, 2008, pp. 1-10.
    • (2008) , pp. 1-10
    • Ene, A.1    Horne, W.2    Milosavljevic, N.3    Rao, P.4    Schreiber, R.5    Tarjan, R.E.6
  • 14
    • 74049139498 scopus 로고    scopus 로고
    • probabilistic approach to hybrid role mining, in: Proc. 16th ACM Conference on Computer and Communications Security, IL, USA
    • M. Frank, A.P. Streich, D. Basin, J.M. Buhmann, A probabilistic approach to hybrid role mining, in: Proc. 16th ACM Conference on Computer and Communications Security, IL, USA, 2009, pp. 101-111.
    • (2009) , pp. 101-111
    • Frank, M.1    Streich, A.P.2    Basin, D.3    Buhmann, J.4
  • 15
    • 77954936501 scopus 로고    scopus 로고
    • StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010
    • H. Takabi, J.B.D. Joshi, StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 55-64.
    • (2010) , pp. 55-64
    • Takabi, H.1    Joshi, J.B.D.2
  • 16
    • 57349117050 scopus 로고    scopus 로고
    • Migrating to optimal RBAC with minimal perturbation, in
    • Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA
    • J. Vaidya, V. Atluri, Q. Guo, N. Adam, Migrating to optimal RBAC with minimal perturbation, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA, 2008, pp. 11-20.
    • (2008) , pp. 11-20
    • Vaidya, J.1    Atluri, V.2    Guo, Q.3    Adam, N.4
  • 17
    • 48349103211 scopus 로고    scopus 로고
    • Optimal boolean matrix decomposition: application to role engineering, in: Proc. 24th International Conference on Data Engineering, Cancun, Mexico
    • H. Lu, J. Vaidya, V. Atluri, Optimal boolean matrix decomposition: application to role engineering, in: Proc. 24th International Conference on Data Engineering, Cancun, Mexico, 2008, pp. 297-306.
    • (2008) , pp. 297-306
    • Lu, H.1    Vaidya, J.2    Atluri, V.3
  • 18
    • 35048813595 scopus 로고    scopus 로고
    • Tiling databases, in: Proc. 7th International Conference Discovery Science, Padova, Italy
    • F. Geerts, B. Goethals, T. Mielikainen, Tiling databases, in: Proc. 7th International Conference Discovery Science, Padova, Italy, 2004, pp. 278-289.
    • (2004) , pp. 278-289
    • Geerts, F.1    Goethals, B.2    Mielikainen, T.3
  • 19
    • 77954945655 scopus 로고    scopus 로고
    • Mining roles with noisy data, in:
    • Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA
    • I. Molloy, N. Li, J. Lobo, L. Dickens, Mining roles with noisy data, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 45-54.
    • (2010) , pp. 45-54
    • Molloy, I.1    Li, N.2    Lobo, J.3    Dickens, L.4
  • 20
    • 70450248454 scopus 로고    scopus 로고
    • 2009
    • Evaluating role mining algorithm, in: Proc. 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy
    • I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, J. Lobo, Evaluating role mining algorithm, in: Proc. 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, 2009, pp. 95-104.
    • Molloy, I.1    Li, N.2    Li, T.3    Mao, Z.4    Wang, Q.5    Lobo, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.