Computer Science ›› 2017, Vol. 44 ›› Issue (8): 115-123.doi: 10.11896/j.issn.1002-137X.2017.08.021

Previous Articles     Next Articles

Acquiring Minimal Role Set Algorithm in Role Engineering

HAN Dao-jun   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Role engineering,which focuses on role acquisition and optimization,is an important research area in role-based access control (RBAC).Recently,there have been many researches on role acquisition and optimization.Howe-ver,these researches either have high time-complexity (NP complete),or cannot guarantee the acquired results optimal.In this paper,we proposed a new algorithm to acquire the optimal (or minimal) role set.Our algorithm has polynomial time complexity,and guarantees to acquire the optimal result.We first pretreated the role set using an algebra measure,and maximum linear independent group was introduced to simplify the role set.And after analyzing the characteristic of every set operator,we built equivalence classes using concept lattice model,and finally attained the optimal role set.The experiment results show that our algorithm is effective.

Key words: Role based access control,Role engineering,Minimal role set

[1] COYNE E J.Role-engineering[C]∥1st ACM Workshop on Role-Based Access Control.1996.
[2] SANDHU R,COYNE E J.Role based access control models[J].IEEE Computer,1996,29(2):38-47.
[3] ZHANG D,RAMAMOHANRAO K,E BRINGER T.Role Engineering using Graph Optimisation[C]∥Symposium on Access Control Models and Technologies (SACMAT).2007:139-144.
[4] SCHLEGELMILCH J,STEENS U.Role mining with orca[C]∥Symposium on Access Control Models and Technologies (SACMAT).ACM,June 2005.
[5] VAIDYA J,ATLURI V,WARNER J.Role Engineering viaPrioritized Subset Enumeration[J].IEEE Transactions on De-pendable and Secure Computing,2010,7(3):300-314.
[6] MOLLOY I,LI N,LI T,et al.Evaluating role mining algorithms[C]∥Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT).2009:95-104.
[7] VAIDYA J,ATLURI V,GUO Q.The Role Mining Problem:Finding a Minimal Descriptive Set of Roles[C]∥Symposium on Access Control Models and Technologies (SACMAT).2007:175-184.
[8] ENE A,HORNE W,MILOSAVLJEVIC N,et al.Fast exact and heuristic methods for role minimization problems[C]∥The ACM Symposium on Access Control Models and Technologies.2008.
[9] COLANTONIO A,DI PIETRO R,OCELLO A,et al.Tamingrole mining complexity in RBAC[J].Computers & Security,2010,9(5):548-564.
[10] MITRA B,SURAL S,VAIDYA J,et al.A Survey of RoleMining[J].ACM Computing Surveys,2016,48(4):1-37.
[11] JAFARIAN J H,TAKABI H,TOUATI H,et al.Towards a General Framework for Optimal Role Mining:A Constraint Sa-tisfaction Approach[C]∥The ACM Symposium.2015:211-220.
[12] WU J W,ZHANG Y,LI R X,et al.Role Updating for Assignments[C]∥Symposium on Access Control Models and Techno-logies.2010:89-98.
[13] AHMED S,OSBORN S L.A system for risk awareness during role mining[C]∥ACM Symposium on Access Control MODELS and Technologies.ACM,2014:181-184.
[14] LU H,VAIDYA J,ATLURI V.Optimal Boolean matrix decomposition:Application to role engineering[C]∥ IEEE Iternational Conference on Data Engineering.IEEE Computer Society,2008:297-306.
[15] LI R,LI H,WANG W,et al.RMiner:a tool set for role mining[C]∥ACM Symposium on Access Control MODELS and Technologies.2013:193-196.
[16] COLANTONIO A,DI PIETRO R,O CELLO A,et al.A formal framework to elicit roles with business meaning in RBAC systems[C]∥Proceedings of the 14th ACM Symposium on Access Control Models and Technologies.2009:85-94.
[17] MA X P,LI R X,LU Z D.Role Mining Based on Weights[C]∥Symposium on Access Control Models and Technologies.Pittsburgh,Pennsylvania,USA,2010:65-74.
[18] WU M Y.Activities and Event-Driven-Based Role Engineering[C]∥2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC).IEEE,2012:550-553.
[19] ZHANG L,ZHANG H L,HAN D J,et al.Theory and Algorithm for Roles Minimization Problem in RBAC Based on Concept Lattice[J].Acta Electronica Sinica,2014,2(12):2371-2378.(in Chinese) 张磊,张宏莉,韩道军,等.基于概念格的RBAC模型中角色最小化问题的理论与算法[J].电子学报,2014,2(12):2371-2378.
[20] YU Q Q.Role Hierarchy Mining For Role Based Access Control[D].Harbin:Harbin Institute of Technology,2013.(in Chinese) 蔚清琴.RBAC中分层角色挖掘算法研究[D].哈尔滨:哈尔滨工业大学,2013.
[21] MI X M.Role Mining Algorithm Based on Evoloutionary Algorithms[D].Beijing:Beijing Jiaotong University,2014.(in Chinese) 米秀明.基于进化算法的角色挖掘算法[D].北京:北京交通大学,2014.
[22] YE W.Role Mining and Logical Programming Model in Access Control[D].Wuhan:Huazhong University of Science and Technology,2014.(in Chinese) 叶威.访问控制中的角色挖掘与逻辑编程模型研究[D].武汉:华中科技大学,2014.
[23] FENG D G,ZHANG M,LI H.Big Data Security and Privacy Protection[J].Chinese Journal of Computer,2014,7(1):246-257.(in Chinese) 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,7(1):246-257.
[24] FANG B X,JIA Y,LI A P,et al.Privacy Preservation in Big Data:A Survey[J].Big Data,2016,2(1):1-18.(in Chinese) 方滨兴,贾焰,李爱平,等.大数据隐私保护技术综述[J].大数据,2016,2(1):1-18.
[25] 北京大学数学系几何与代数教研室代数小组.高等代数(第二版)[M].北京:高等教育出版社.1988:6.
[26] SYROPOULOS A.Mathematics of Multisets[M]∥Multiset Pro-cessing.Spinger Berlin Heidelberg,2000:347-358.
[27] LOEB D.Sets with a negative number of elements[J].Advances in Mathematics,1992,91(91):64-74.
[28] GANTER B,WILLE R.Formal concept analysis:Mathematical foundations[M].Berlin:Springer-Verlag,1999.
[29] ZHANG D,RAMAMOHANARAO K,ZHANG R.Syntheticdata generation for study of role engineering[EB/OL].http://www.cs.mu.oz.au/~zhangd/roledata.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!