A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016‏ - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Policy Engineering in RBAC and ABAC

S Das, B Mitra, V Atluri, J Vaidya, S Sural - … Jajodia on the Occasion of His …, 2018‏ - Springer
Abstract Role-based Access Control (RBAC) and Attribute-based access control (ABAC) are
the most widely used access control models for mediating controlled access to resources in …

Mining meaningful and rare roles from web application usage patterns

N Gal-Oz, Y Gonen, E Gudes - Computers & Security, 2019‏ - Elsevier
Role mining refers to the problem of discovering an optimal set of roles from existing user
permissions. Most role mining algorithms, use the full set of user-permission assignments …

An improved minimal noise role mining algorithm based on role interpretability

H Kang, G Liu, Q Wang, Q Zhang, J Niu, N Luo - Computers & Security, 2023‏ - Elsevier
Interpretable role mining has achieved notable improvements in usability and effectiveness
of roles in RBAC deployments, owing to its virtue in mining meaningful roles. However …

A business-driven decomposition methodology for role mining

A Colantonio, R Di Pietro, NV Verde - Computers & Security, 2012‏ - Elsevier
It is generally accepted that role mining–that is, the discovery of roles through the automatic
analysis of data from existing access control systems–must count on business requirements …

Automatic top-down role engineering framework using natural language processing techniques

M Narouei, H Takabi - … Conference on Information Security Theory and …, 2015‏ - Springer
A challenging problem in managing large networks is the complexity of security
administration. Role Based Access Control (RBAC) is the most well-known access control …

RMMDI: A Novel Framework for Role Mining Based on the Multi‐Domain Information

W Bai, Z Pan, S Guo, Z Chen - Security and Communication …, 2019‏ - Wiley Online Library
Role‐based access control (RBAC) is widely adopted in network security management, and
role mining technology has been extensively used to automatically generate user roles from …

Deriving current state RBAC models from event logs

A Baumgrass - 2011 sixth international conference on …, 2011‏ - ieeexplore.ieee.org
Process-aware information systems are used to execute business processes to reach the
operational goals of an organization. In this context, access control policies are defined to …

Role mining based on permission cardinality constraint and user cardinality constraint

X Ma, R Li, H Wang, H Li - Security and Communication …, 2015‏ - Wiley Online Library
Constraint is an essential aspect of role‐based access control (RBAC) and is sometimes
argued to be the principle motivation for RBAC. However, most of role mining algorithms do …

Bridging the gap between role mining and role engineering via migration guides

A Baumgrass, M Strembeck - information security technical report, 2013‏ - Elsevier
In the context of role-based access control (RBAC), mining approaches, such as role mining
or organizational mining, can be applied to derive permissions and roles from a system's …