Using the graph-theoretic approach to solving the Role Mining problem

被引:0
|
作者
Belim, Sergey V. [1 ]
Mironenko, Anton N. [1 ]
机构
[1] Dostoevsky Omsk State Univ, Fac Comp Sci, OmSU, Omsk, Russia
关键词
role-based security policy; associative rules; Roles Mining; privilege matrix;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The problem of Roles Mining is to build a role-based security policy for large information systems based on an analysis of the set of allowed user permissions. The article presents an algorithm for analyzing the matrix of authorized user permissions for optimal role formation. A set of permissions for an individual user is treated as a transaction. As a transaction record, used authority to act on the system. After that, the algorithm of searching for associative rules for the set of authorities is applied. Only associative rules are considered, including one power as a prerequisite and one as a consequence. A graph of the relationship of authority in the given system is being constructed. This graph is oriented weighted. The weight of the arc is determined by the support of the corresponding associative rule. For the graph constructed, clustering is performed using the community search algorithm. A hierarchy of communities is being built. Powers unite in roles if they are part of the same community. The hierarchy of communities defines the hierarchy of roles. The proposed algorithm can be used both for building a role-based security policy, and for optimizing an already existing role hierarchy.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A GRAPH-THEORETIC APPROACH TO ANALYSIS OF INTERNATIONAL RELATIONS
    HARARY, F
    MILLER, H
    [J]. JOURNAL OF CONFLICT RESOLUTION, 1970, 14 (01) : 57 - &
  • [42] A GRAPH-THEORETIC APPROACH TO A CONJECTURE OF DIXON AND PRESSMAN
    Brassil, Matthew
    Reichstein, Zinovy
    [J]. ISRAEL JOURNAL OF MATHEMATICS, 2022, 252 (01) : 291 - 336
  • [43] An approach of feature selection using graph-theoretic heuristic and hill climbing
    Saptarsi Goswami
    Amit Kumar Das
    Priyanka Guha
    Arunabha Tarafdar
    Sanjay Chakraborty
    Amlan Chakrabarti
    Basabi Chakraborty
    [J]. Pattern Analysis and Applications, 2019, 22 : 615 - 631
  • [44] THE MAGNETIC-FIELD PROBLEM - A GRAPH-THEORETIC MODEL
    SAVAGE, GJ
    MADAN, VK
    KESAVAN, HK
    [J]. IEEE TRANSACTIONS ON MAGNETICS, 1980, 16 (04) : 579 - 585
  • [45] POWER SYSTEM TOPOLOGICAL OBSERVABILITY USING A DIRECT GRAPH-THEORETIC APPROACH
    QUINTANA, VH
    SIMOESCOSTA, A
    MANDEL, A
    [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1982, 101 (03): : 617 - 626
  • [46] A Nonsmooth Calculus for Solving Some Graph-Theoretic Control Problems
    Ross, Isaac M.
    Karpenko, Mark
    Proulx, Ronald J.
    [J]. IFAC PAPERSONLINE, 2016, 49 (18): : 462 - 467
  • [47] Multi-layer assignment steganography using graph-theoretic approach
    Hanzhou Wu
    Hongxia Wang
    Hong Zhao
    Xiuying Yu
    [J]. Multimedia Tools and Applications, 2015, 74 : 8171 - 8196
  • [48] ON THE EXISTENCE OF AN EFFICIENT PARALLEL ALGORITHM FOR A GRAPH-THEORETIC PROBLEM
    ZEROVNIK, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 591 : 359 - 368
  • [49] A GRAPH-THEORETIC PROBLEM CONNECTED WITH INTERSECTION OF CIRCUMFERENCE CHORDS
    VOLCHENKOV, SG
    [J]. SOVIET JOURNAL OF COMPUTER AND SYSTEMS SCIENCES, 1986, 24 (04): : 155 - 159
  • [50] Multi-layer assignment steganography using graph-theoretic approach
    Wu, Hanzhou
    Wang, Hongxia
    Zhao, Hong
    Yu, Xiuying
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (18) : 8171 - 8196