skip to main content
research-article

Mining Roles with Multiple Objectives

Published:01 December 2010Publication History
Skip Abstract Section

Abstract

With the growing adoption of Role-Based Access Control (RBAC) in commercial security and identity management products, how to facilitate the process of migrating a non-RBAC system to an RBAC system has become a problem with significant business impact. Researchers have proposed to use data mining techniques to discover roles to complement the costly top-down approaches for RBAC system construction. An important problem is how to construct RBAC systems with low complexity. In this article, we define the notion of weighted structural complexity measure and propose a role mining algorithm that mines RBAC systems with low structural complexity. Another key problem that has not been adequately addressed by existing role mining approaches is how to discover roles with semantic meanings. In this article, we study the problem in two primary settings with different information availability. When the only information is user-permission relation, we propose to discover roles whose semantic meaning is based on formal concept lattices. We argue that the theory of formal concept analysis provides a solid theoretical foundation for mining roles from a user-permission relation. When user-attribute information is also available, we propose to create roles that can be explained by expressions of user-attributes. Since an expression of attributes describes a real-world concept, the corresponding role represents a real-world concept as well. Furthermore, the algorithms we propose balance the semantic guarantee of roles with system complexity. Finally, we indicate how to create a hybrid approach combining top-down candidate roles. Our experimental results demonstrate the effectiveness of our approaches.

References

  1. Agrawal, R. and Srikant, R. 1994. Fast algorithms for mining association rules. In Proceedings of the VLDB Conference. 487--499. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Buecker, A., Palacios, J. C., Davis, B., Hastings, T., and Yip, I. 2005. Identity management design guide with IBM Tivoli Identity Manager. IBM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Colantonio, A., Pietro, R. D., and Ocello, A. 2008a. A cost-driven approach to role engineering. In Proceedings of the ACM Symposium on Applied Computing (SAC’08). 2129--2136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Colantonio, A., Pietro, R. D., and Ocello, A. 2008b. Leveraging lattices to improve role mining. In Proceedings of the IFIP International Conference on Information Security (SEC’08). 333--347.Google ScholarGoogle Scholar
  5. Coyne, E. J. 1995. Role engineering. In Proceedings of the ACM Workshop on Role-Based Access Control (RBAC’95). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dawande, M., Keskinocak, P., Swaminathan, J. M., and Tayur, S. 2001. On bipartite and multipartite clique problems. J. Algor. 41, 2, 388--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ene, A. 2007. Biclique covers of bipartite graphs: The minimum biclique cover and edge concentration problems. Tech. rep., Princeton University.Google ScholarGoogle Scholar
  8. Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., and Tarjan, R. E. 2008. Fast exact and heuristic methods for role minimization problems. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’08). ACM Press, New York, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Frank, M., Basin, D., and Buhmann, J. M. 2008. A class of probabilistic models for role engineering. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gallaher, M. P., O’Connor, A. C., and Kropp, B. 2002. The economic impact of role-based access control. Planning rep. 02-1, National Institute of Standards and Technology.Google ScholarGoogle Scholar
  11. Ganter, B. and Wille, R. 1998. Formal Concept Analysis: Mathematical Foundations. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Krajca, P., Outrata, J., and Vychodil, V. 2008. Parallel recursive algorithm for FCA. In Concept Lattices and Their Applications.Google ScholarGoogle Scholar
  13. Kuhlmann, M., Shohat, D., and Schimpf, G. 2003. Role mining - Revealing business roles for security administration using data mining technology. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’03). ACM Press, New York, 179--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lin, X. 2000. One the computational complexity of edge concentration. Discr. Appl. Math. 101, 197--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lindig, C. 2000. Fast concept analysis. Working with Conceptual Structures - Contributions to ICCS’00.Google ScholarGoogle Scholar
  16. Lindig, C. 2007. Mining patterns and violations using concept analysis. Tech. rep.,Universitat des Saarlandes, Saarbrucken, Germany.Google ScholarGoogle Scholar
  17. Lu, H., Vaidya, J., and Atluri, V. 2008. Optimal boolean matrix decomposition: Application to role engineering. In Proceedings of the International Conference on Data Engineering (ICDE’08). 297--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., and Lobo, J. 2008. Mining roles with semantic meanings. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., and Lobo, J. 2009. Evaluating role mining algorithms. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Neumann, G. and Strembeck, M. 2002. A scenario-driven role engineering process for functional RBAC roles. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’02). 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Roeckle, H., Schimpf, G., and Weidinger, R. 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the ACM Workshop on Role-Based Access Control (RBAC’00). ACM Press, New York, 103--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Schlegelmilch, J. and Steffens, U. 2005. Role mining with ORCA. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’05). ACM Press, New York, 168--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Shin, D., Ahn, G.-J., Cho, S., and Jin, S. 2003. On modeling system-centric information for role engineering. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’03). 169--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Stoller, S. D., Yang, P., Ramakrishnan, C. R., and Gofman, M. I. 2007. Efficient policy analysis for administrative role based access control. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’07). ACM Press, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Stumme, G., Taouil, R., Bastide, Y., Pasquier, N., and Lakhal, L. 2002. Computing iceberg concept lattices with Titanic. Data Knowl. Engin. 42, 2, 189--222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Vaidya, J., Atluri, V., and Guo, Q. 2007. The role mining problem: Finding a minimal descriptive set of roles. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Vaidya, J., Atluri, V., Guo, Q., and Adam, N. 2008. Migrating to optimal rbac with minimal perturbation. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’08). 11--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Vaidya, J., Atluri, V., and Warner, J. 2006. RoleMiner: Mining roles using subset enumeration. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’06). ACM, New York, 144--153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zhang, D., Ramamohanarao, K., and Ebringer, T. 2007. Role engineering using graph optimisation. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT’07). 139--144. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mining Roles with Multiple Objectives

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Information and System Security
          ACM Transactions on Information and System Security  Volume 13, Issue 4
          December 2010
          412 pages
          ISSN:1094-9224
          EISSN:1557-7406
          DOI:10.1145/1880022
          Issue’s Table of Contents

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 December 2010
          • Accepted: 1 April 2010
          • Revised: 1 March 2010
          • Received: 1 December 2008
          Published in tissec Volume 13, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader