Sciweavers

SAC
2010
ACM

A simple role mining algorithm

13 years 10 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 years aiming at simplifying the management of centralized access control. The definition of a good set of roles in order to match the organizational requirements of a company is a problem partially solved by role mining techniques, which return automatically a set of roles compatible with the permissions assigned to users. Unfortunately, the problem of finding an optimal role set has been proved to be NP-hard; so heuristics have been introduced in order to approximate the optimal solution. In this work we propose a novel heuristic and compare its results showing its efficiency and effectiveness.
Carlo Blundo, Stelvio Cimato
Added 17 May 2010
Updated 17 May 2010
Type Conference
Year 2010
Where SAC
Authors Carlo Blundo, Stelvio Cimato
Comments (0)