Skip to main content

Reconfiguration of RBAC schemes by genetic algorithms

  • Conference paper
  • First Online:
Intelligent Distributed Computing X (IDC 2016)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 678))

Included in the following conference series:

Abstract

Nowadays, Role-Based Access Control (RBAC) is a widespread access control model. Search of the “users-roles” and “roles-permissions” mappings for the given “users-permissions” mapping is the problem of Data Mining called as Role Mining Problem (RMP). However, in the known works devoted to the RMP, the problem of RBAC scheme reconfiguration and methods for solving it are not considered. The paper defines the statement of the problem of RBAC scheme reconfiguration and suggests a genetic algorithm for solving it. Experimental results show the algorithm has a high enough effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, Ch.E.: Role-Based Access Control Models. In: Computer, vol. 29 n.2, pp.38-47 (1996).

    Google Scholar 

  2. Frank, M., Buhmann, J.M., Basin, D.: On the Definition of Role Mining. In: 15th ACM symposium on Access control models and technologies, pp. 35-44 (2010).

    Google Scholar 

  3. Verma, G., Verma, V.: Role and Applications of Genetic Algorithm in Data Mining. In: International Journal of Computer Applications, vol. 48, is.17, pp. 5-8 ( 2012).

    Google Scholar 

  4. Saenko, I., Kotenko, I.: Genetic Algorithms for Role Mining Problem. In: PDP 2011 Conference, pp. 646-650 (2011).

    Google Scholar 

  5. Saenko, I., Kotenko, I.: Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. In: PDP 2011 Conference, pp. 269-274 (2012).

    Google Scholar 

  6. Kotenko, I., Saenko, I.: Improved genetic algorithms for solving the optimization tasks in access scheme design for computer networks. In: International Journal of Bio-Inspired Computation, vol.7, no.2, pp.98-110 (2015).

    Google Scholar 

  7. Vaidya, J., Atluri, V., Guo, Q.: The Role Mining Problem: Finding a Minimal Descriptive Set of Roles. In: ACM symposium on Access control models, pp.175-184 (2007).

    Google Scholar 

  8. Kuhlmann, M., Shohat, D., Schimpf, G.: Role Mining – Revealing Business Roles for Security Administration using Data Mining Technology. In: 8th ACM symposium on Access control models and technologies, pp.179-186 (2003).

    Google Scholar 

  9. Lu, H., Hong, Y., Yang, Y., Duan, L., Badar, N.: Towards User-Oriented RBAC Model. In: Journal of Computer Security, vol.23, is.1, pp. 107-129 (2015).

    Google Scholar 

  10. Vaidya, J., Atluri, V., Warner, J.: RoleMiner: mining roles using subset enumeration. In: 13th ACM conference on Computer and communications security, pp. 144-153 (2006).

    Google Scholar 

  11. Blundo, C., Cimato, S.: A Simple Role Mining Algorithm. In: 2010 ACM Symposium on Applied Computing, pp. 1958-1962 (2010).

    Google Scholar 

  12. Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: A Probabilistic Bound on the Basic Role Mining Problem and its Applications. In: IFIP Advances in Information and Communication Technology, vol.297, pp. 376-386 (2009).

    Google Scholar 

  13. Frank, M., Buhmann, J.M., Basin, D.: Role Mining with Probabilistic Models. In: ACM Transactions on Information and System Security, vol.15, is.4, article no.15 (2013).

    Google Scholar 

  14. Frank, M., Streich, A.P., Basin, D.: Multi-Assignment Clustering for Boolean Data. In: The Journal of Machine Learning Research, Vol.13, no.1, pp. 459-489 (2012).

    Google Scholar 

  15. Colantonio, A., Di Pietro, R., Ocello: A cost-driven approach to role engineering. In: 2008 ACM symposium on Applied computing, pp. 2129-2136 (2008).

    Google Scholar 

  16. Molloy, I., Li, N., Li, T. Lobo, J.: Evaluating Role Mining Algorithms. In: 14th ACM symposium on Access control models and technologies, pp. 95-104 (2009).

    Google Scholar 

  17. Jafari, M., Chinaei, A.H., Barker, K., Fathian, M.: Role Mining in Access History Logs. In: International Journal of Computer Information Systems and Industrial Management Applications, vol.1, no.1, pp. 258-265 (2009).

    Google Scholar 

  18. Uzun, E., Atluri, V., Lu, H., Vaidya, J.: An Optimization Model for the Extended Role Mining Problem. In: LNCS, vol.6818, pp. 76-89 (2011).

    Google Scholar 

  19. Blundo, C., Cimato, S.: Constrained Role Mining. In: LNCS, vol.7783, pp. 289-304 (2013).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Kotenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Saenko, I., Kotenko, I. (2017). Reconfiguration of RBAC schemes by genetic algorithms. In: Badica, C., et al. Intelligent Distributed Computing X. IDC 2016. Studies in Computational Intelligence, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-48829-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48829-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48828-8

  • Online ISBN: 978-3-319-48829-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics