A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Intelligent role-based access control model and framework using semantic business roles in multi-domain environments

R Ghazal, AK Malik, N Qadeer, B Raza… - IEEE …, 2020 - ieeexplore.ieee.org
Today's rapidly develo** communication technologies and dynamic collaborative
business models made the security of data and resources more crucial than ever especially …

Mining attribute-based access control policies from logs

Z Xu, SD Stoller - Data and Applications Security and Privacy XXVIII: 28th …, 2014 - Springer
Attribute-based access control (ABAC) provides a high level of flexibility that promotes
security and information sharing. ABAC policy mining algorithms have potential to …

Policy Engineering in RBAC and ABAC

S Das, B Mitra, V Atluri, J Vaidya, S Sural - … Jajodia on the Occasion of His …, 2018 - Springer
Abstract Role-based Access Control (RBAC) and Attribute-based access control (ABAC) are
the most widely used access control models for mediating controlled access to resources in …

Towards user-oriented RBAC model

H Lu, Y Hong, Y Yang, L Duan… - Journal of Computer …, 2015 - content.iospress.com
Role mining is to define a role set to implement the role-based access control (RBAC)
system and regarded as one of the most important and costliest implementation phases …

An approach to access control under uncertainty

F Salim, J Reid, E Dawson… - 2011 Sixth International …, 2011 - ieeexplore.ieee.org
In dynamic and uncertain environments such as healthcare, where the needs of security and
information availability are difficult to balance, an access control approach based on a static …

[HTML][HTML] Mining constraints in role-based access control

X Ma, R Li, Z Lu, W Wang - Mathematical and Computer Modelling, 2012 - Elsevier
Constraints are an important aspect of role-based access control (RBAC) and sometimes
argued to be the principal motivation of RBAC. While role engineering is proposed to define …

Toward mining of temporal roles

B Mitra, S Sural, V Atluri, J Vaidya - … and Privacy XXVII: 27th Annual IFIP …, 2013 - Springer
Abstract In Role-Based Access Control (RBAC), users acquire permissions through their
assigned roles. Role mining, the process of finding a set of roles from direct user-permission …

The generalized temporal role mining problem

B Mitra, S Sural, V Atluri… - Journal of Computer …, 2015 - content.iospress.com
Role mining, the process of deriving a set of roles from the available user-permission
assignments, is considered to be an essential step in successful implementation of Role …

Role mining based on permission cardinality constraint and user cardinality constraint

X Ma, R Li, H Wang, H Li - Security and Communication …, 2015 - Wiley Online Library
Constraint is an essential aspect of role‐based access control (RBAC) and is sometimes
argued to be the principle motivation for RBAC. However, most of role mining algorithms do …