@anneba

Evaluating role mining algorithms

, , , , , and . SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologies, page 95--104. New York, NY, USA, ACM, (2009)
DOI: http://doi.acm.org/10.1145/1542207.1542224

Abstract

While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluated when they were proposed, but the evaluations were using different datasets and evaluation criteria. In this paper, we introduce a comprehensive framework for evaluating role mining algorithms. We categorize role mining algorithms into two classes based on their outputs; Class 1 algorithms output a sequence of prioritized roles while Class 2 algorithms output complete RBAC states. We then develop techniques that enable us to compare these algorithms directly. We also introduce a new role mining algorithm and two new ways for algorithmically generating datasets for evaluation. Using synthetic as well as real datasets, we compared nine role mining algorithms. Our results illustrate the strengths and weaknesses of these algorithms.

Description

Evaluating role mining algorithms

Links and resources

Tags

community

  • @anneba
  • @dblp
@anneba's tags highlighted