Sciweavers

262 search results - page 4 / 53
» Role mining with ORCA
Sort
View
SACMAT
2009
ACM
13 years 11 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 3 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SACMAT
2010
ACM
13 years 9 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
SAC
2010
ACM
14 years 3 days ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
ICDE
2006
IEEE
152views Database» more  ICDE 2006»
14 years 6 months ago
Mining Actionable Patterns by Role Models
Data mining promises to discover valid and potentially useful patterns in data. Often, discovered patterns are not useful to the user. "Actionability" addresses this pro...
Ke Wang, Yuelong Jiang, Alexander Tuzhilin