skip to main content
10.1145/775412.775435acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Role mining - revealing business roles for security administration using data mining technology

Authors Info & Claims
Published:02 June 2003Publication History

ABSTRACT

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.

References

  1. G. Schimpf, "Security Administration and Control of Corporate-Wide Diverse Systems," in ACM SIGSAC Review, vol. 15(1), 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. "Security Administration Manager (SAM), Release 2.4. Concepts and Facilities," Systor GmbH & Co. KG, Küüln, Germany (1999).Google ScholarGoogle Scholar
  3. B. J. Biddle and E. J. Thomas, "Role Theory: Concepts and Research". New York: Robert E. Krieger Publishing Company, 1979.Google ScholarGoogle Scholar
  4. D. F. Ferraiolo and R. D. Kuhn, "Role-Based Access Controls," presented at 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, USA, 1992.Google ScholarGoogle Scholar
  5. R. Awischus, "Role-Based Access Control with the Security Administration Manager (SAM)", presented at 2nd ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based Access Control Models", IEEE Computer, vol. 29(2), 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. S. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles", ACM Transactions on Information and System Security, Vol. 1 (No.2 Feb.), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Münkeberg and R. Rakete, "Three for One: Role-based Access Control in Rapidly Changing Heterogeneous Environments", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Rückle, G. Schimpf, and R. Weidinger, "Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. S. Sandhu, "Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. S. Sandhu, D. F. Ferraiolo, and R. D. Kuhn, "The NIST Model for Role-Based Access Control: Towards A Unified Standard", presented at 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. J. Coyne, "Role-Engineering", presented at 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. B. Fernandez and J. C. Hawkins, "Determining Role Rights from Use Cases", presented at 2nd Workshop on Role-Based Access Control, Fairfax, VA, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Kern and M. Kuhlmann, A.Schaad and J. Moffett, "Observations on the Role Life-Cycle in the Context of Enterprise Security Management", presented at SACMAT 2002, Monterey, CA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D.F. Ferraiolo, "An Argument for Role-Based Access Control", presented at SACMAT 2001, Chantilly, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P.A. Epstein, "Engineering of Role/Permission Assignments" - doctoral dissertation 2002, GMU Fairfax, VA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Jaeger, "On the Increasing Importance of Constraints", presented at 4th ACM Workshop on Role-Based Access Control, Fairfax, VA, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Nyanchama and S. Osborn, "The Role Graph Model and Conflict of Interest", ACM Transactions on Information and System Security, Vol. 2 (No. 1, Febr), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Grabmeyer and A. Rudolph, "Techniques of Cluster Algorithms in Data Mining", IBM Informationssysteme GmbH, December 10, 1998.Google ScholarGoogle Scholar
  20. A. Kern, "Advanced Features for Enterprise-Wide Role-based Access Control", 18th Annual Computer Security Applications Conference, Las Vegas, NV, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. IBM Intelligent Miner for Data, User Manual.Google ScholarGoogle Scholar
  22. H. Rückle and G. Schimpf, "Rollen-Engineering im IT-Berechtigungsmanagement" KES Zeitschrift für Kommunikations- und EDV Sicherheit 5/00, 2000.Google ScholarGoogle Scholar

Index Terms

  1. Role mining - revealing business roles for security administration using data mining technology

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader