Abstract
Nowadays, Role-Based Access Control (RBAC) is a widespread access control model. Search of the “users-roles” and “roles-permissions” mappings for the given “users-permissions” mapping is the problem of Data Mining called as Role Mining Problem (RMP). However, in the known works devoted to the RMP, the problem of RBAC scheme reconfiguration and methods for solving it are not considered. The paper defines the statement of the problem of RBAC scheme reconfiguration and suggests a genetic algorithm for solving it. Experimental results show the algorithm has a high enough effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, Ch.E.: Role-Based Access Control Models. In: Computer, vol. 29 n.2, pp.38-47 (1996).
Frank, M., Buhmann, J.M., Basin, D.: On the Definition of Role Mining. In: 15th ACM symposium on Access control models and technologies, pp. 35-44 (2010).
Verma, G., Verma, V.: Role and Applications of Genetic Algorithm in Data Mining. In: International Journal of Computer Applications, vol. 48, is.17, pp. 5-8 ( 2012).
Saenko, I., Kotenko, I.: Genetic Algorithms for Role Mining Problem. In: PDP 2011 Conference, pp. 646-650 (2011).
Saenko, I., Kotenko, I.: Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. In: PDP 2011 Conference, pp. 269-274 (2012).
Kotenko, I., Saenko, I.: Improved genetic algorithms for solving the optimization tasks in access scheme design for computer networks. In: International Journal of Bio-Inspired Computation, vol.7, no.2, pp.98-110 (2015).
Vaidya, J., Atluri, V., Guo, Q.: The Role Mining Problem: Finding a Minimal Descriptive Set of Roles. In: ACM symposium on Access control models, pp.175-184 (2007).
Kuhlmann, M., Shohat, D., Schimpf, G.: Role Mining – Revealing Business Roles for Security Administration using Data Mining Technology. In: 8th ACM symposium on Access control models and technologies, pp.179-186 (2003).
Lu, H., Hong, Y., Yang, Y., Duan, L., Badar, N.: Towards User-Oriented RBAC Model. In: Journal of Computer Security, vol.23, is.1, pp. 107-129 (2015).
Vaidya, J., Atluri, V., Warner, J.: RoleMiner: mining roles using subset enumeration. In: 13th ACM conference on Computer and communications security, pp. 144-153 (2006).
Blundo, C., Cimato, S.: A Simple Role Mining Algorithm. In: 2010 ACM Symposium on Applied Computing, pp. 1958-1962 (2010).
Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: A Probabilistic Bound on the Basic Role Mining Problem and its Applications. In: IFIP Advances in Information and Communication Technology, vol.297, pp. 376-386 (2009).
Frank, M., Buhmann, J.M., Basin, D.: Role Mining with Probabilistic Models. In: ACM Transactions on Information and System Security, vol.15, is.4, article no.15 (2013).
Frank, M., Streich, A.P., Basin, D.: Multi-Assignment Clustering for Boolean Data. In: The Journal of Machine Learning Research, Vol.13, no.1, pp. 459-489 (2012).
Colantonio, A., Di Pietro, R., Ocello: A cost-driven approach to role engineering. In: 2008 ACM symposium on Applied computing, pp. 2129-2136 (2008).
Molloy, I., Li, N., Li, T. Lobo, J.: Evaluating Role Mining Algorithms. In: 14th ACM symposium on Access control models and technologies, pp. 95-104 (2009).
Jafari, M., Chinaei, A.H., Barker, K., Fathian, M.: Role Mining in Access History Logs. In: International Journal of Computer Information Systems and Industrial Management Applications, vol.1, no.1, pp. 258-265 (2009).
Uzun, E., Atluri, V., Lu, H., Vaidya, J.: An Optimization Model for the Extended Role Mining Problem. In: LNCS, vol.6818, pp. 76-89 (2011).
Blundo, C., Cimato, S.: Constrained Role Mining. In: LNCS, vol.7783, pp. 289-304 (2013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Saenko, I., Kotenko, I. (2017). Reconfiguration of RBAC schemes by genetic algorithms. In: Badica, C., et al. Intelligent Distributed Computing X. IDC 2016. Studies in Computational Intelligence, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-48829-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-48829-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48828-8
Online ISBN: 978-3-319-48829-5
eBook Packages: EngineeringEngineering (R0)