Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other softwares. The migration process towards RBAC, starting from the current access configuration, relies on the design of role mining techniques, whose aim is to define suitable roles that implement the given access policies. Some constraints can be used to transform the roles automatically output by the mining procedures and effectively capture the organization’s status under analysis. Such constraints can limit the final configuration characteristics, such as the number of roles assigned to a user, or the number of permissions included in a role, and produce a resulting role set that is effectively usable in real-world situations. In this paper, we consider two constraints: the number of permissions a role can include and the number of roles assigned to any user. In particular, we present two heuristics that produce roles compliant with both constraints and evaluate their performances using both real-world and synthetic datasets.

Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints

Blundo, Carlo
;
2022-01-01

Abstract

Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other softwares. The migration process towards RBAC, starting from the current access configuration, relies on the design of role mining techniques, whose aim is to define suitable roles that implement the given access policies. Some constraints can be used to transform the roles automatically output by the mining procedures and effectively capture the organization’s status under analysis. Such constraints can limit the final configuration characteristics, such as the number of roles assigned to a user, or the number of permissions included in a role, and produce a resulting role set that is effectively usable in real-world situations. In this paper, we consider two constraints: the number of permissions a role can include and the number of roles assigned to any user. In particular, we present two heuristics that produce roles compliant with both constraints and evaluate their performances using both real-world and synthetic datasets.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4759365
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 4
social impact