Role recommender-RBAC: Optimizing user-role assignments in RBAC
نویسندگان
چکیده
In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on role-based control (RBAC) system. Hence, security administrator needs dynamically maintain role assignments users for optimizing user-role assignments. The manual updation of is prone error and increases administrative workload. Therefore, recommendation model introduced RBAC system optimize user behaviour patterns. It shown that automatically revokes refurbishes by observing behaviour. This used cloud providing Role-Assignment-as-a-Service cost built-in roles. Several experiments are conducted verify proposed using Amazon sample dataset. experimental results show efficiency 50% higher than state-of-the-art.
منابع مشابه
Extended RBAC with Role Attributes
Though RBAC has been researched for many years as a current dominant access control technology, there are few researches to be done to address the further extension of the role which is the fundamental entity of RBAC. This paper tries to extend the role to a further level, the role attributes. Through the attributes, the function and operation on the role can be enhanced and extended. Through t...
متن کاملTaming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to user-permission assignments identified in th...
متن کاملTowards User-Oriented RBAC Model
Role mining is to define a role set to implement the role-based access control (RBAC) system and regarded as one of the most important and costliest implementation phases. While various role mining models have been proposed, we find that user experience/perception – one ultimate goal for any information system – is surprisingly ignored by the existing works. One advantage of RBAC is to support ...
متن کاملRBAC-MAS & SODA: Experimenting RBAC in AOSE
Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA. In particular, we show how a clear separation between mechanisms and polici...
متن کاملDS RBAC - Dynamic Sessions in Role Based Access Control
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasing attention. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI). While the mandatory concept of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Communications
سال: 2021
ISSN: ['1873-703X', '0140-3664']
DOI: https://doi.org/10.1016/j.comcom.2020.12.006