Using the graph-theoretic approach to solving the Role Mining problem

被引:0
|
作者
Belim, Sergey V. [1 ]
Mironenko, Anton N. [1 ]
机构
[1] Dostoevsky Omsk State Univ, Fac Comp Sci, OmSU, Omsk, Russia
关键词
role-based security policy; associative rules; Roles Mining; privilege matrix;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The problem of Roles Mining is to build a role-based security policy for large information systems based on an analysis of the set of allowed user permissions. The article presents an algorithm for analyzing the matrix of authorized user permissions for optimal role formation. A set of permissions for an individual user is treated as a transaction. As a transaction record, used authority to act on the system. After that, the algorithm of searching for associative rules for the set of authorities is applied. Only associative rules are considered, including one power as a prerequisite and one as a consequence. A graph of the relationship of authority in the given system is being constructed. This graph is oriented weighted. The weight of the arc is determined by the support of the corresponding associative rule. For the graph constructed, clustering is performed using the community search algorithm. A hierarchy of communities is being built. Powers unite in roles if they are part of the same community. The hierarchy of communities defines the hierarchy of roles. The proposed algorithm can be used both for building a role-based security policy, and for optimizing an already existing role hierarchy.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A GRAPH-THEORETIC APPROACH TO A COMMUNICATIONS PROBLEM
    CHARTRAND, G
    [J]. SIAM JOURNAL ON APPLIED MATHEMATICS, 1966, 14 (04) : 778 - &
  • [2] A GRAPH-THEORETIC APPROACH TO A PALLET LOADING PROBLEM
    DOWSLAND, KA
    [J]. NEW ZEALAND OPERATIONAL RESEARCH, 1985, 13 (02): : 77 - 86
  • [3] A Graph-theoretic Approach to the Reach Control Problem
    Ornik, Melkior
    Broucke, Mireille E.
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [4] A GRAPH-THEORETIC APPROACH TO THE RELATIVE PLACEMENT PROBLEM
    WEIS, BX
    MLYNSKI, DA
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1988, 35 (03): : 286 - 293
  • [5] A Graph-Theoretic Approach to the Train Marshalling Problem
    Doerpinghaus, Jens
    Schrader, Rainer
    [J]. PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 227 - 231
  • [6] A graph-theoretic approach to steganography
    Hetzl, S
    Mutzel, P
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 119 - 128
  • [7] A graph-theoretic approach to multitasking
    Alon, Noga
    Reichman, Daniel
    Shinkar, Igor
    Wagner, Tal
    Musslick, Sebastian
    Cohen, Jonathan D.
    Griffiths, Thomas L.
    Dey, Biswadip
    Ozcimder, Kayhan
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [8] Protein domain decomposition using a graph-theoretic approach
    Xu, Y
    Xu, D
    Gambow, HN
    [J]. BIOINFORMATICS, 2000, 16 (12) : 1091 - 1104
  • [9] GRAPH-THEORETIC APPROACH TO METABOLIC PATHWAYS
    GOLDSTEIN, BN
    SELIVANOV, VA
    [J]. BIOMEDICA BIOCHIMICA ACTA, 1990, 49 (8-9) : 645 - 650
  • [10] MULTIVARIABLE CONTROL A GRAPH-THEORETIC APPROACH
    REINSCHKE, KJ
    [J]. LECTURE NOTES IN CONTROL AND INFORMATION SCIENCES, 1988, 108 : 1 - +