Affiliation:
1. Goa Institute of Management, India
2. Indian Institute of Technology, Kharagpur, India
3. Rutgers University, USA
Abstract
For any successful business endeavor, recruitment of a required number of appropriately qualified employees in proper positions is a key requirement. For effective utilization of human resources, reorganization of such workforce assignment is also a task of utmost importance. This includes situations when the under-performing employees have to be substituted with fresh applicants. Generally, the number of candidates applying for a position is large, and hence, the task of identifying an optimal subset becomes critical. Moreover, a human resource manager would also like to make use of the opportunity of retirement of employees to improve manpower utilization. However, the constraints enforced by the security policies prohibit any arbitrary assignment of tasks to employees. Further, the new employees should have the capabilities required to handle the assigned tasks. In this article, we formalize this problem as the Optimal Recruitment Problem (ORP), wherein the goal is to select the minimum number of fresh employees from a set of candidates to fill the vacant positions created by the outgoing employees, while ensuring satisfiability of the specified security conditions. The model used for specification of authorization policies and constraints is Attribute-Based Access Control (ABAC), since it is considered to be the
de facto
next-generation framework for handling organizational security policies. We show that the ORP problem is NP-hard and propose a greedy heuristic for solving it. Extensive experimental evaluation shows both the effectiveness and efficiency of the proposed solution.
Funder
National Science Foundation
National Institutes of Health
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Management Information Systems
Reference55 articles.
1. Axiomatics. 2016. The Evolution of RBAC Models to Next-Generation ABAC. Axiomatics (White Paper). Retrieved from www.axiomatics.com/resources/rbac-to-abac/. Axiomatics. 2016. The Evolution of RBAC Models to Next-Generation ABAC. Axiomatics (White Paper). Retrieved from www.axiomatics.com/resources/rbac-to-abac/.
2. D. E. Bell and L. J. Lapadula. 1976. Secure computer system: Unified exposition and multics interpretation. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA. D. E. Bell and L. J. Lapadula. 1976. Secure computer system: Unified exposition and multics interpretation. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA.
3. 2013. Personnel scheduling: A literature review;Bergh J. V.;European Journal of Operational Research,2013
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献