skip to main content
research-article

The role mining problem: A formal perspective

Published:30 July 2010Publication History
Skip Abstract Section

Abstract

Devising a complete and correct set of roles has been recognized as one of the most important and challenging tasks in implementing role-based access control. A key problem related to this is the notion of goodness/interestingness—when is a role good/interesting? In this article, we define the Role Mining Problem (RMP) as the problem of discovering an optimal set of roles from existing user permissions. The main contribution of this article is to formally define RMP and analyze its theoretical bounds. In addition to the above basic RMP, we introduce two different variations of the RMP, called the δ-Approx RMP and the minimal-noise RMP that have pragmatic implications. We reduce the known “Set Basis Problem” to RMP to show that RMP is an NP-complete problem. An important contribution of this article is also to show the relation of the RMP to several problems already identified in the data mining and data analysis literature. By showing that the RMP is in essence reducible to these known problems, we can directly borrow the existing implementation solutions and guide further research in this direction. We also develop a heuristic solution based on the previously proposed FastMiner algorithm, which is very accurate and efficient.

References

  1. Brooks, K. 1999. Migrating to role-based access control. In Proceedings of the 4th Workshop on Role-Based Access Control. ACM, New York, 71--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Coyne, E. J. 1996. Role engineering. In Proceedings of the 1st Workshop on Role-Based Access Control. ACM, New York, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Damm, C., Kim, K. H., and Roush, F. 1999. On covering and rank problems for Boolean matrices and their applications. In Proceedings of the 5th Annual International Conference on Computing and Combinatorics. Springer-Verlag, Berlin, 123--133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., and Jan, R. T. 2008. Fast exact and heuristic methods for role minimization problems. In Proceedings of the Symposium on Access Control Models and Technologies. ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Epstein, P. and Sandhu, R. 2001. Engineering of role/permission assignments. In Proceedings of the 17th Annual Computer Security Applications Conference. IEEE, Los Alamitos, CA, 127--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fernandez, E. B. and Hawkins, J. C. 1997. Determining role rights from use cases. In Proceedings of the 2nd Workshop on Role-Based Access Control. ACM, New York, 121--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and Chandramouli, R. 2001. Proposed nist standard for role-based access control. ACM Trans. Inform. Syst. Secur. 4, 3, 224--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gallagher, M. P., O'Connor, A. C., and Kropp, B. 2002. The economic impact of role-based access control. Planning report 02-1, National Institute of Standards and Technology.Google ScholarGoogle Scholar
  9. Garey, M. R. and Johnson, D. S. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Geerts, F., Goethals, B., and Mielikainen, T. 2004. Tiling databases. In Discovery Science. Springer-Verlag, Berlin, 278--289.Google ScholarGoogle Scholar
  11. Han, J., Pei, J., and Yin, Y. 2000. Mining frequent patterns without candidate generation. In Proceedings of the International Conference on Management of Data. ACM, New York, 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hochbaum, D. S. 1998. Approximating clique and biclique problems. J. Algorithms 29, 1, 174--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kern, A., Kuhlmann, M., Schaad, A., and Moffett, J. 2002. Observations on the role lifecycle in the context of enterprise security management. In Proceedings of the 7th Symposium on Access Control Models and Technologies. ACM, New York, 43--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kuhlmann, M., Shohat, D., and Schimpf, G. 2003. Role mining—revealing business roles for security administration using data mining technology. In Proceedings of the 8th Symposium on Access Control Models and Technologies. ACM, New York, 179--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lu, H., Vaidya, J., and Atluri, V. 2008. Optimal Boolean matrix decomposition: Application to role engineering. In Proceedings of the 24th International Conference on Data Engineering. IEEE, Los Alamitos, CA, 297--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Markowsky, G. 1992. Ordering d-classes and computing schein rank is hard. Semi-Group Forum 44, 373--375.Google ScholarGoogle ScholarCross RefCross Ref
  17. Mielikäinen, T. 2003. Intersecting data to closed sets with constraints. In Proceedings of the Workshop on Frequent Itemset Mining Implementations. CEUR, The Netherlands.Google ScholarGoogle Scholar
  18. Miettinen, P. 2006. The discrete basis problem, master's thesis. M.S. thesis, University of Helsinki.Google ScholarGoogle Scholar
  19. Miettinen, P., Mielikainen, T., Gionis, A., Das, G., and Mannila, H. 2006. The discrete basis problem. In Proceedings of the 10th European Conference on Principles and Knowledge Discovery in Databases. Springer, Berlin, 335--346. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mishra, N., Ron, D., and Swaminathan, R. 2003. On finding large conjunctive clusters. In Learning Theory and Kernel Machines: Proceedings of the 16th Annual Conference on Learning Theory and 7th Kernel Workshop (COLT/Kernel'03). Springer, Berlin, 448--462.Google ScholarGoogle Scholar
  21. Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., and Lobo, J. 2008. Mining roles with semantic meanings. In Proceedings of the 13th Symposium on Access Control Models and Technologies. ACM, New York, 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Neumann, G. and Strembeck, M. 2002. A scenario-driven role engineering process for functional rbac roles. In Proceedings of the 7th Symposium on Access Control Models and Technologies. ACM, New York, 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Pan, F., Cong, G., Tung, A. K. H., Yang, J., and Zaki, M. J. 2003. Carpenter: Finding closed patterns in long biological datasets. In Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining. ACM, New York, 637--642. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Peeters, R. 2003. The maximum edge biclique problem is np-complete. Discrete Appl. Math. 131, 3, 651--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Roeckle, H., Schimpf, G., and Weidinger, R. 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the 5th Workshop on Role-based Access Control. ACM, New York, 103--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Computer 29, 2, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Schaad, A., Moffett, J., and Jacob, J. 2001. The role-based access control system of a European bank: a case study and discussion. In Proceedings of the 6th Symposium on Access Control Models and Technologies. ACM, New York, 3--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Schlegelmilch, J. and Steffens, U. 2005. Role mining with orca. In Proceedings of the 10th Symposium on Access Control Models and Technologies. ACM, New York, 168--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Shin, D., Ahn, G.-J., Cho, S., and Jin, S. 2003. On modeling system-centric information for role engineering. In Proceedings of the 8th Symposium on Access Control Models and Technologies. ACM, New York, 169--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Thomsen, D., O'Brien, R., and Bogle, J. 1998. Role-based access control framework for network enterprises. In Proceedings of the 14th Annual Computer Security Applications Conference. IEEE, Los Alamitos, CA, 50--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Vaidya, J., Atluri, V., and Warner, J. 2006. Roleminer: Finding roles using subset enumeration. In Proceedings of the 13th Conference on Computer and Communications Security. ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The role mining problem: A formal perspective

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Information and System Security
          ACM Transactions on Information and System Security  Volume 13, Issue 3
          July 2010
          253 pages
          ISSN:1094-9224
          EISSN:1557-7406
          DOI:10.1145/1805974
          Issue’s Table of Contents

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 July 2010
          • Accepted: 1 February 2009
          • Received: 1 January 2008
          Published in tissec Volume 13, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader