Role mining - revealing business roles for security administration using data mining technology | BibSonomy

Role mining - revealing business roles for security administration using data mining technology

, , и . SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, стр. 179--186. New York, NY, USA, ACM, (2003)

Аннотация

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.

Описание

Role mining - revealing business roles for security administration using data mining technology

Линки и ресурсы

DOI:
10.1145/775412.775435
URL:
ключ BibTeX:
775435
искать в:

Комментарии и рецензии  
(0)

Комментарии, или рецензии отсутствуют. Вы можете их написать!

Tags


Цитировать эту публикацию