کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
1136468 1489150 2012 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Mining constraints in role-based access control
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی کنترل و سیستم های مهندسی
پیش نمایش صفحه اول مقاله
Mining constraints in role-based access control
چکیده انگلیسی

Constraints are an important aspect of role-based access control (RBAC) and sometimes argued to be the principal motivation of RBAC. While role engineering is proposed to define an architectural structure of the organization’s security policies, none of the work has employed constraint mining in migrating a non-RBAC system to an RBAC system to our knowledge, thus providing the motivation for this work. In this paper, we first define a wide variety of constraints, which are the best-known ones to date, and then create a relationship between the conventional data mining technology and the constraints. We further propose an anti-association rule mining algorithm to generate the constraints. Experiments on performance study prove the superiority of the new algorithm.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Mathematical and Computer Modelling - Volume 55, Issues 1–2, January 2012, Pages 87–96
نویسندگان
, , , ,