A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Role mining - revealing business roles for security administration using data mining technology
2003
Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base
doi:10.1145/775433.775435
fatcat:yxac3dtsnzf3vbipth4zzydh3m