A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Bridging the gap between role mining and role engineering via migration guides
2013
Information Security Technical Report
Keywords: RBAC Migration Model comparison Role engineering Role mining a b s t r a c t In the context of role-based access control (RBAC), mining approaches, such as role mining or organizational mining, can be applied to derive permissions and roles from a system's configuration or from log files. In this way, mining techniques document the current state of a system and produce current-state RBAC models. However, such current-state RBAC models most often follow from structures that have
doi:10.1016/j.istr.2013.03.003
fatcat:3kftpbqf2zgg5exlcjtrl52sdu