Mining constraints in role-based access control

被引:18
|
作者
Ma, Xiaopu [1 ,2 ]
Li, Ruixuan [1 ]
Lu, Zhengding [1 ]
Wang, Wei [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Nanyang Normal Univ, Sch Comp & Informat Technol, Nanyang 473061, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Role-based access control (RBAC); Role engineering; Constraints; Constraint mining;
D O I
10.1016/j.mcm.2011.01.053
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Constraints are an important aspect of role-based access control (RBAC) and sometimes argued to be the principal motivation of RBAC. While role engineering is proposed to define an architectural structure of the organization's security policies, none of the work has employed constraint mining in migrating a non-RBAC system to an RBAC system to our knowledge, thus providing the motivation for this work. In this paper, we first define a wide variety of constraints, which are the best-known ones to date, and then create a relationship between the conventional data mining technology and the constraints. We further propose an anti-association rule mining algorithm to generate the constraints. Experiments on performance study prove the superiority of the new algorithm. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:87 / 96
页数:10
相关论文
共 50 条
  • [1] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [2] A Survey of Role Mining Methods in Role-Based Access Control System
    Fang, Liang
    Guo, Yunchuan
    [J]. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 291 - 300
  • [3] Combination of Duty and Historical Constraints in Role-Based Access Control
    Hosseini, Ali
    Azgomi, Mohammad Abdollahi
    [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +
  • [4] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [5] MUTUAL EXCLUSION ROLE CONSTRAINT MINING BASED ON WEIGHT IN ROLE-BASED ACCESS CONTROL SYSTEM
    Ma, Xiaopu
    Wang, Jianfang
    Zhao, Li
    Li, Ruixuan
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (01): : 91 - 101
  • [6] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [7] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [8] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [9] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [10] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398