Role recommender-RBAC: Optimizing user-role assignments in RBAC

نویسندگان

چکیده

In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on role-based control (RBAC) system. Hence, security administrator needs dynamically maintain role assignments users for optimizing user-role assignments. The manual updation of is prone error and increases administrative workload. Therefore, recommendation model introduced RBAC system optimize user behaviour patterns. It shown that automatically revokes refurbishes by observing behaviour. This used cloud providing Role-Assignment-as-a-Service cost built-in roles. Several experiments are conducted verify proposed using Amazon sample dataset. experimental results show efficiency 50% higher than state-of-the-art.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extended RBAC with Role Attributes

Though RBAC has been researched for many years as a current dominant access control technology, there are few researches to be done to address the further extension of the role which is the fundamental entity of RBAC. This paper tries to extend the role to a further level, the role attributes. Through the attributes, the function and operation on the role can be enhanced and extended. Through t...

متن کامل

Taming role mining complexity in RBAC

In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to user-permission assignments identified in th...

متن کامل

Towards User-Oriented RBAC Model

Role mining is to define a role set to implement the role-based access control (RBAC) system and regarded as one of the most important and costliest implementation phases. While various role mining models have been proposed, we find that user experience/perception – one ultimate goal for any information system – is surprisingly ignored by the existing works. One advantage of RBAC is to support ...

متن کامل

RBAC-MAS & SODA: Experimenting RBAC in AOSE

Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA. In particular, we show how a clear separation between mechanisms and polici...

متن کامل

DS RBAC - Dynamic Sessions in Role Based Access Control

Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasing attention. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI). While the mandatory concept of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Communications

سال: 2021

ISSN: ['1873-703X', '0140-3664']

DOI: https://doi.org/10.1016/j.comcom.2020.12.006