Sciweavers

Share
SACMAT
2003
ACM

Role mining - revealing business roles for security administration using data mining technology

10 years 9 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns. Moreover, a tool (the SAM Role Miner) is described. The result allows an organized migration process to RBAC with the goal of building a single point of administration and control, using a cross-platform administration tool. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection – Access Controls; H.2.0 [Information Systems]: General – Security, Integrity, and Protection; K.6.5 [Management o...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
Added 05 Jul 2010
Updated 05 Jul 2010
Type Conference
Year 2003
Where SACMAT
Authors Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
Comments (0)
books