Affiliation:
1. University of California Berkeley
2. ETH Zürich
Abstract
Role mining tackles the problem of finding a role-based access control (RBAC) configuration, given an access-control matrix assigning users to access permissions as input. Most role-mining approaches work by constructing a large set of candidate roles and use a greedy selection strategy to iteratively pick a small subset such that the differences between the resulting RBAC configuration and the access control matrix are minimized. In this article, we advocate an alternative approach that recasts role mining as an inference problem rather than a lossy compression problem. Instead of using combinatorial algorithms to minimize the number of roles needed to represent the access-control matrix, we derive probabilistic models to learn the RBAC configuration that most likely underlies the given matrix.
Our models are generative in that they reflect the way that permissions are assigned to users in a given RBAC configuration. We additionally model how user-permission assignments that conflict with an RBAC configuration emerge and we investigate the influence of constraints on role hierarchies and on the number of assignments. In experiments with access-control matrices from real-world enterprises, we compare our proposed models with other role-mining methods. Our results show that our probabilistic models infer roles that generalize well to new system users for a wide variety of data, while other models’ generalization abilities depend on the dataset given.
Funder
Zurich Information Security Center
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Divine and mortal loves;Religious Studies;2023-03-15
2. The Secrecy Resilience of Access Control Policies and Its Application to Role Mining;Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies;2022-06-07
3. Hybrid Role-Engineering Optimization with Multiple Cardinality Constraints Using Natural Language Processing and Integer Linear Programming Techniques;Mobile Information Systems;2022-05-11
4. Toward Deep Learning Based Access Control;Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy;2022-04-14
5. Informed Privilege-Complexity Trade-Offs in RBAC Configuration;Proceedings of the 25th ACM Symposium on Access Control Models and Technologies;2020-05-28