In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns. Moreover, a tool (the SAM Role Miner) is described. The result allows an organized migration process to RBAC with the goal of building a single point of administration and control,...
Role-based access control (RBAC) offers significant advan-tages over lower-level access control poli...
The success of role-based access control both within the research community and industry is undeniab...
With the growing adoption of role-based access control (RBAC) in commercial security and identity ma...
Access control is currently one of the most important topics in ICT security. The main areas of rese...
Abstract — The main areas of research related to access control concern the identification of method...
International audienceThe concept of role has revolutionized the access control systems by making th...
Role-based access control (RBAC) allows to effectively manage the risk derived from granting access ...
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity ...
Role-based access control (RBAC) has become the norm for enforcing security since it has been succe...
RBAC (Role-Based Access Control [2]) is a widely adopted access control model. According to this mod...
There have been many approaches proposed for role mining. However, the problems solved often differ ...
In this paper we describe the work in progress with a process-oriented approach for role-finding to ...
Abstract. Role-based access control is widely accepted as a best practice to ef-fectively limit syst...
Role-based access control (RBAC) has become a de facto standard to control access to restricted reso...
Numerous studies have shown that currently, role-based access control has becoming one of the succes...
Role-based access control (RBAC) offers significant advan-tages over lower-level access control poli...
The success of role-based access control both within the research community and industry is undeniab...
With the growing adoption of role-based access control (RBAC) in commercial security and identity ma...
Access control is currently one of the most important topics in ICT security. The main areas of rese...
Abstract — The main areas of research related to access control concern the identification of method...
International audienceThe concept of role has revolutionized the access control systems by making th...
Role-based access control (RBAC) allows to effectively manage the risk derived from granting access ...
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity ...
Role-based access control (RBAC) has become the norm for enforcing security since it has been succe...
RBAC (Role-Based Access Control [2]) is a widely adopted access control model. According to this mod...
There have been many approaches proposed for role mining. However, the problems solved often differ ...
In this paper we describe the work in progress with a process-oriented approach for role-finding to ...
Abstract. Role-based access control is widely accepted as a best practice to ef-fectively limit syst...
Role-based access control (RBAC) has become a de facto standard to control access to restricted reso...
Numerous studies have shown that currently, role-based access control has becoming one of the succes...
Role-based access control (RBAC) offers significant advan-tages over lower-level access control poli...
The success of role-based access control both within the research community and industry is undeniab...
With the growing adoption of role-based access control (RBAC) in commercial security and identity ma...