@anneba@anneba

Role mining - revealing business roles for security administration using data mining technology

Martin Kuhlmann, Dalia Shohat, and Gerhard Schimpf. SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, page 179--186. New York, NY, USA, ACM, (2003)

Abstract

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control RBAC based on already existing access rights patterns in their production IT-systems.

Description

Role mining - revealing business roles for security administration using data mining technology

Links and resources

You can use this internal link to create references to this post in your discussions. Just copy this internal link and paste it in your discussion text.

Comments or reviews  
(0)

There is no review or comment yet. You can write one!

Tags


Cite this publication