BibSonomy :: publication :: Role mining - revealing business roles for security administration using data mining technology

Role mining - revealing business roles for security administration using data mining technology

Martin Kuhlmann, Dalia Shohat, and Gerhard Schimpf. SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, page 179--186. New York, NY, USA, ACM, (2003)

Abstract

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.

Description

Role mining - revealing business roles for security administration using data mining technology

Links and resources

DOI:10.1145/775412.775435
URL:http://portal.acm.org/citation.cfm?id=775412.775435
BibTeX key:775435
internal link:
?
You can use this internal link to create references to this post in your discussions. Just copy this internal link and paste it in your discussion text.
search on:

Comments or reviews  
(0)

There is no review or comment yet. You can write one!

Tags

  • Last update 5 years and a month ago.
  • Created 5 years and a month ago.

Cite this publication

Role mining - revealing business roles for security administration using data mining technology

Martin Kuhlmann, Dalia Shohat, and Gerhard Schimpf. SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, page 179--186. New York, NY, USA, ACM, (2003)