skip to main content
10.1145/1363686.1364198acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A cost-driven approach to role engineering

Published:16 March 2008Publication History

ABSTRACT

In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the complexity involved in identifying a set of roles fitting the real needs of the company. All the various role engineering methods proposed thus far lack a metric for measuring the "quality" of candidate roles produced. This paper proposes a new approach guided by a cost-based metric, where "cost" represents the effort to administer the resulting RBAC. Further, we propose REAM (Role-Based Association-rule Mining), an algorithm leveraging the cost metric to find candidate role-sets with the lowest possible administration cost. For a specific parameter set, RBAM behaves as already existing role mining algorithms and is, worst case, NP-complete. Yet, we will provide several examples showing the sensibility of assumptions made by the algorithm. Further, application of the algorithm to real data will highlight the improvements over current solutions. Finally, we comment on the direction of future research.

References

  1. R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In J. B. Bocca, M. Jarke, and C. Zaniolo, editors, Proceedings on the 20th International Conference on Very Large Data Bases, VLDB, pages 487--499. Morgan Kaufmann, Dec. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ANSI/INCITS 359-2004, information technology-role based access control. InterNational Committee for Information Technology Standards (INCITS), 2004.Google ScholarGoogle Scholar
  3. E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3):231--285, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. J. Coyne. Role-engineer ing. In Proceedings of the 1st ACM Workshop on Role-Based Access Control, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Epstein and R. Sandhu. Engineering of role/permission assignments. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 127--136. IEEE Computer Society, Dec. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34--64, Feb. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. F. Ferraiolo and R. Kuhn. Role-based access controls. In Proceedings of the 15th NIST-NSA National Computer Security Conference, pages 554--563, Baltimore, MD, USA, Oct. 1992.Google ScholarGoogle Scholar
  8. M. P. Gallagher, A. O'Connor, and B. Kropp. The economic impact of role-based access control. Technical report, Planning report 02-1, National Institute of Standards and Technology (NIST), 2002.Google ScholarGoogle Scholar
  9. A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the role life-cycle in the context of enterprise security management. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, USA, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining -- revealing business roles for security administration using data mining technology. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pages 179--186, New York, NY, USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional rbac roles. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Röckle. Role-finding/role-engineering. In Proceedings of the 5th ACM Workshop on Role-Based Access Control, page 68, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Röckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the 5th ACM Workshop on Role-Based Access Control, volume 3, pages 103--110, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Schimpf. Role-engineering: Critical success factors for enterprise security administration, Dec. 2000. Position paper for {13}.Google ScholarGoogle Scholar
  16. J. Schlegelmilch and U. Steffens. Role mining with ORCA. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pages 168--176, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: finding a minimal descriptive set of roles. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pages 175--184, New York, NY, USA, 2007. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Vaidya, V. Atluri, and J. Warner. Roleminer: mining roles using subset enumeration. In Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 144--153, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Yang. Computational aspects of mining maximal frequent patterns. Theoretical Computer Science, 362(1):63--85, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Zhang, K. Ramamohanarao, and T. Ebringer. Role engineering using graph optimisation. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pages 139--144, New York, NY, USA, 2007. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A cost-driven approach to role engineering

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
          March 2008
          2586 pages
          ISBN:9781595937537
          DOI:10.1145/1363686

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 March 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader