In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.
Description
Role mining - revealing business roles for security administration using data mining technology
%0 Conference Paper
%1 775435
%A Kuhlmann, Martin
%A Shohat, Dalia
%A Schimpf, Gerhard
%B SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
%C New York, NY, USA
%D 2003
%I ACM
%K RBAC administration model role-definition role-mining
%P 179--186
%R http://doi.acm.org/10.1145/775412.775435
%T Role mining - revealing business roles for security administration using data mining technology
%U http://portal.acm.org/citation.cfm?id=775412.775435
%X In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.
%@ 1-58113-681-1
@inproceedings{775435,
abstract = {In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.},
added-at = {2009-10-01T10:52:58.000+0200},
address = {New York, NY, USA},
author = {Kuhlmann, Martin and Shohat, Dalia and Schimpf, Gerhard},
biburl = {https://www.bibsonomy.org/bibtex/295942ba06bb49489f1665467a40d777a/anneba},
booktitle = {SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies},
description = {Role mining - revealing business roles for security administration using data mining technology},
doi = {http://doi.acm.org/10.1145/775412.775435},
interhash = {74c9d3a49b85749d3f86167d38205b69},
intrahash = {95942ba06bb49489f1665467a40d777a},
isbn = {1-58113-681-1},
keywords = {RBAC administration model role-definition role-mining},
location = {Como, Italy},
pages = {179--186},
publisher = {ACM},
timestamp = {2009-10-01T10:52:58.000+0200},
title = {Role mining - revealing business roles for security administration using data mining technology},
url = {http://portal.acm.org/citation.cfm?id=775412.775435},
year = 2003
}