Zobrazeno 1 - 10
of 1 473
pro vyhledávání: '"Role mining"'
With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) — a policy-neutral access
Autor:
Tripunitara, Mahesh
Bottom-up role-mining is the determination of a set of roles given as input a set of users and the permissions those users possess. It is well-established in the research literature, and in practice, as an important problem in information security. A
Externí odkaz:
http://arxiv.org/abs/2407.15278
Autor:
Zhu, Fubao1 (AUTHOR) fbzhu@zzuli.edu.cn, Yang, Chenguang1 (AUTHOR) 18839179007@163.com, Zhu, Liang1 (AUTHOR) lzhu@zzuli.edu.cn, Zuo, Hongqiang2 (AUTHOR) zuohq2023@163.com, Gu, Jingzhong1,2 (AUTHOR) 13903868786@139.com
Publikováno v:
Symmetry (20738994). Aug2024, Vol. 16 Issue 8, p1008. 35p.
Role mining is a technique used to derive a role-based authorization policy from an existing policy. Given a set of users $U$, a set of permissions $P$ and a user-permission authorization relation $\mahtit{UPA}\subseteq U\times P$, a role mining algo
Externí odkaz:
http://arxiv.org/abs/2403.16757
Publikováno v:
Symmetry, Vol 16, Iss 8, p 1008 (2024)
Role-based access control (RBAC) is a widely adopted access control model in various domains for defining security management. Role mining is closely related to role-based access control, as the latter employs role assignments to offer a flexible and
Externí odkaz:
https://doaj.org/article/ee066b938dda434589cc7bb6050603f0
Autor:
MITRA, BARSHA1 (AUTHOR) barsha.mitra@sit.iitkgp.ernet.in, SURAL, SHAMIK1 (AUTHOR) shamik@cse.iitkgp.ernet.in, VAIDYA, JAIDEEP2 (AUTHOR) jsvaidya@rutgers.edu, ATLURI, VIJAYALAKSHMI2 (AUTHOR) atluri@rutgers.edu
Publikováno v:
ACM Computing Surveys. May2016, Vol. 48 Issue 4, p50:1-50:37. 37p. 6 Diagrams, 12 Charts.
Autor:
Blundo, Carlo, Cimato, Stelvio
Publikováno v:
In Journal of Information Security and Applications November 2023 78
Publikováno v:
In Computers & Security April 2023 127