Entry Frank:2013:RMP from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Frank:2013:RMP,
author = "Mario Frank and Joachim M. Buhman and David Basin",
title = "Role Mining with Probabilistic Models",
journal = j-TISSEC,
volume = "15",
number = "4",
pages = "15:1--15:??",
month = apr,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2445566.2445567",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Apr 4 18:18:20 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Role mining tackles the problem of finding a
role-based access control (RBAC) configuration, given
an access-control matrix assigning users to access
permissions as input. Most role-mining approaches work
by constructing a large set of candidate roles and use
a greedy selection strategy to iteratively pick a small
subset such that the differences between the resulting
RBAC configuration and the access control matrix are
minimized. In this article, we advocate an alternative
approach that recasts role mining as an inference
problem rather than a lossy compression problem.
Instead of using combinatorial algorithms to minimize
the number of roles needed to represent the
access-control matrix, we derive probabilistic models
to learn the RBAC configuration that most likely
underlies the given matrix. Our models are generative
in that they reflect the way that permissions are
assigned to users in a given RBAC configuration. We
additionally model how user-permission assignments that
conflict with an RBAC configuration emerge and we
investigate the influence of constraints on role
hierarchies and on the number of assignments. In
experiments with access-control matrices from
real-world enterprises, we compare our proposed models
with other role-mining methods. Our results show that
our probabilistic models infer roles that generalize
well to new system users for a wide variety of data,
while other models' generalization abilities depend on
the dataset given.",
acknowledgement = ack-nhfb,
articleno = "15",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- ability,
2(2)159,
10(1)4,
13(4)39,
14(1)9,
14(1)10,
14(4)29,
18(2)8
- access-control,
9(4)421,
10(1)2,
10(1)3,
10(2)5,
10(2)7,
10(4)2,
10(4)4,
14(1)2,
14(1)9,
15(4)18,
16(4)17
- additionally,
13(4)34,
13(4)37,
17(2)7
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
10(4)3,
11(1)4,
11(3)12,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(3)11,
15(4)17,
16(1)4,
17(3)11,
17(4)13,
18(1)1,
18(1)4,
18(4)14
- alternative,
2(1)3,
2(1)34,
2(3)295,
10(4)3,
12(3)16,
15(2)10,
17(2)8,
17(4)14,
18(4)13
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- assigned,
10(1)2,
15(2)6,
17(1)1,
18(1)1
- assigning,
12(3)18
- assignment,
2(1)105,
10(2)7,
10(4)2,
12(1)1,
13(3)24,
15(3)13,
16(1)4
- based, role-,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(2)177,
4(3)224,
5(4)492,
6(2)201,
6(3)404,
9(4)391,
10(2)5,
10(2)7,
10(4)2,
12(3)15,
13(3)24,
13(3)27,
13(3)28,
15(3)13
- Basin, David,
14(2)16,
15(3)13,
16(1)3,
17(2)7
- candidate,
13(2)14,
13(3)25,
17(3)12
- combinatorial,
11(2)1
- compare,
1(1)93,
12(1)2,
15(2)10
- compression,
1(1)3
- configuration,
2(2)177,
12(3)14,
15(3)13,
15(4)17,
17(2)5,
18(1)4,
18(2)7
- conflict,
2(1)3,
13(4)40,
14(1)9,
16(4)17,
17(1)2
- constraint,
2(1)65,
3(4)207,
6(4)501,
7(3)392,
9(2)162,
10(1)2,
10(2)5,
10(2)7,
10(4)2,
11(1)3,
11(2)6,
11(3)14,
11(4)20,
12(2)8,
12(2)10,
12(3)19,
13(1)5,
13(3)22,
13(3)25,
13(4)40,
14(4)32,
15(2)10,
15(3)13,
16(1)3,
16(1)4,
16(4)17,
17(1)3,
17(2)8,
18(2)6
- constructing,
3(4)227,
13(4)33,
17(3)12,
18(3)10
- control, access-,
9(4)421,
10(1)2,
10(1)3,
10(2)5,
10(2)7,
10(4)2,
10(4)4,
14(1)2,
14(1)9,
15(4)18,
16(4)17
- dataset,
10(1)4,
10(4)4,
12(1)4,
13(4)32,
15(4)17,
16(2)8,
16(4)14,
17(3)12,
18(2)7,
18(4)12,
18(4)14
- depend,
1(1)26,
14(1)8,
15(4)16
- derive,
9(2)181,
10(1)4,
12(3)18,
18(1)4
- difference,
10(1)3,
12(3)17
- enterprise,
2(1)34,
2(3)269,
11(1)4,
13(4)31,
14(1)3,
15(3)13,
15(4)18,
17(3)11
- experiment,
10(4)1,
10(4)4,
11(2)5,
11(3)12,
11(4)22,
12(2)13,
13(3)28,
16(2)6,
16(3)10,
16(3)11,
16(4)14,
17(3)12,
17(4)15,
18(3)11
- finding,
12(2)10,
13(1)10,
13(3)20,
15(2)7,
16(1)4,
17(4)14,
18(1)1,
18(4)13
- generalization,
12(1)5,
15(1)2
- generalize,
12(1)1,
13(3)25,
16(1)3,
16(1)4,
17(2)7,
18(4)12
- given,
1(1)3,
1(1)93,
2(1)3,
2(1)105,
10(1)2,
10(2)5,
10(4)1,
11(2)3,
11(4)19,
11(4)20,
12(1)2,
12(1)5,
12(1)6,
12(3)14,
12(4)20,
13(1)10,
13(3)26,
14(3)26,
15(2)10,
15(3)12,
16(1)3,
16(1)4,
17(3)12
- greedy,
2(3)295,
11(4)19,
17(4)13
- hierarchy,
10(1)2,
10(4)2,
11(3)15,
12(3)18,
12(4)20,
14(1)4,
17(2)7
- how,
2(1)3,
2(2)138,
2(3)269,
7(2)319,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(3)13,
11(4)18,
12(1)2,
12(2)9,
12(2)12,
12(3)18,
12(3)19,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(1)5,
15(3)14,
16(1)3,
16(2)5,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- infer,
12(1)4,
17(1)2,
18(1)1
- inference,
8(1)78,
8(1)119,
10(1)4,
10(4)2
- influence,
17(2)8,
18(1)4
- input,
10(4)3,
10(4)4,
12(2)10,
14(1)7,
14(3)27,
14(4)32,
15(4)17,
16(1)4,
16(2)6,
18(1)4
- instead,
10(1)4,
12(2)10,
16(4)13,
18(4)13
- investigate,
10(3)12,
11(2)6,
12(1)2,
15(2)7,
16(1)3,
16(2)8,
18(1)2
- iteratively,
11(4)22,
18(2)5,
18(4)12
- large,
1(1)66,
2(1)65,
9(4)391,
11(1)4,
11(3)15,
12(2)13,
13(4)32,
14(1)12,
14(1)13,
14(3)25,
15(1)4,
15(3)14,
16(2)8,
16(4)14,
17(3)10,
17(3)11,
18(4)14
- learn,
1(1)66,
10(3)10,
13(1)10
- likely,
1(1)66,
12(2)11,
13(3)25,
14(1)2,
15(3)14,
16(2)8,
17(2)8
- matrix,
10(4)1
- method,
1(1)3,
1(1)26,
2(2)159,
2(3)295,
2(3)332,
2(4)416,
9(3)259,
10(1)3,
10(3)10,
10(4)4,
10(4)5,
11(2)2,
11(3)16,
11(4)19,
11(4)22,
12(1)2,
12(1)6,
12(2)13,
12(3)16,
13(2)15,
13(4)35,
15(1)4,
15(2)10,
15(3)12,
15(4)17,
17(3)12,
18(3)9
- minimize,
14(1)2,
14(1)12,
17(3)10,
17(3)11
- minimized,
15(3)13
- mining,
13(3)27,
13(4)36,
14(1)2
- most,
2(3)332,
9(4)391,
11(2)2,
11(3)12,
11(4)22,
12(2)8,
12(2)12,
12(3)14,
12(4)21,
13(1)10,
13(3)27,
13(4)30,
14(3)27,
15(1)5,
15(2)6,
15(4)18,
16(1)4,
16(2)6,
16(4)13,
16(4)14,
17(3)11,
17(3)12,
17(4)16,
18(1)1
- needed,
2(3)332,
10(4)3,
14(1)5,
15(2)10,
17(4)13,
18(2)6
- new,
1(1)3,
1(1)93,
2(1)105,
2(2)138,
2(3)295,
9(2)181,
9(4)461,
10(1)3,
10(2)6,
10(4)6,
11(4)17,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(2)15,
13(4)29,
13(4)34,
14(1)4,
14(1)5,
14(1)6,
14(1)13,
14(3)23,
14(3)27,
14(4)30,
15(1)3,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
16(2)5,
16(2)7,
16(3)12,
16(4)16,
16(4)17,
17(1)4,
17(2)7,
17(3)10,
17(4)15,
18(1)1,
18(1)2,
18(3)10,
18(3)11
- number,
7(2)319,
9(2)181,
10(1)4,
10(2)5,
10(3)11,
10(3)12,
10(4)5,
11(1)2,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
12(1)1,
12(1)2,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)13,
12(3)16,
12(3)18,
12(4)21,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(4)32,
13(4)34,
14(1)11,
14(3)26,
14(4)31,
15(1)4,
15(2)7,
15(2)8,
16(1)4,
16(2)7,
16(4)14,
16(4)16,
17(3)10,
17(4)16,
18(2)8
- other,
1(1)93,
2(4)354,
9(4)461,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)1,
10(4)5,
11(2)2,
11(2)6,
11(3)15,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)10,
12(3)14,
12(3)17,
12(4)22,
13(3)24,
13(3)25,
13(4)40,
14(3)23,
14(3)27,
14(4)30,
15(1)5,
15(2)6,
15(3)11,
15(3)14,
16(4)15,
17(2)8,
17(3)9,
18(1)1,
18(1)3,
18(2)6,
18(4)12
- permission,
1(1)26,
2(1)105,
10(1)2,
10(2)5,
10(4)2,
12(4)20,
13(3)24,
13(3)27,
17(1)2
- probabilistic,
11(3)13,
11(4)18,
14(1)12,
15(3)11,
15(3)14
- problem,
1(1)3,
2(3)269,
2(3)295,
5(3)238,
9(2)162,
9(4)391,
10(2)5,
10(2)8,
10(3)9,
10(3)10,
10(3)12,
10(4)1,
10(4)3,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
12(1)2,
12(1)6,
12(2)9,
12(3)18,
12(4)20,
13(3)22,
13(3)26,
13(3)27,
13(4)33,
13(4)36,
13(4)40,
14(3)25,
14(4)31,
15(4)18,
16(1)3,
16(1)4,
16(3)11,
16(4)15,
17(2)8,
17(3)11,
17(4)15,
18(1)3
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- rather,
2(1)65,
2(3)332,
9(4)461,
10(2)8,
12(3)16,
13(1)10,
13(4)31,
18(4)13
- RBAC,
2(1)34,
2(1)105,
5(3)332,
7(3)392,
9(4)391,
10(1)2,
10(2)5,
12(1)1,
13(3)24,
13(3)27,
13(4)36,
14(1)3,
15(4)18,
16(2)5
- real-world,
2(2)159,
14(1)10,
16(4)14,
16(4)16,
18(2)7
- reflect,
13(3)20
- represent,
11(4)21,
14(1)3,
17(1)2
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- resulting,
2(1)34,
10(1)2,
10(4)2,
11(4)20,
15(1)4,
15(1)5,
15(2)10,
15(3)13,
16(3)10,
16(4)17,
17(2)7
- role,
2(1)3,
2(1)65,
2(1)105,
2(2)177,
9(2)113,
10(1)2,
10(2)5,
10(4)2,
11(1)3,
11(4)20,
12(1)1,
12(3)15,
13(3)20,
13(3)27,
13(4)36,
13(4)40,
15(3)13,
15(4)18
- role-based,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(2)177,
3(4)207,
4(1)37,
4(3)191,
4(3)224,
5(4)492,
6(2)201,
6(3)404,
9(4)391,
10(2)5,
10(2)7,
10(4)2,
12(1)1,
12(3)15,
13(3)24,
13(3)27,
13(3)28,
15(3)13
- selection,
1(1)3,
2(2)177,
11(2)3,
11(2)5,
13(4)29,
13(4)32,
17(4)14
- set,
2(1)34,
2(2)138,
2(4)390,
8(1)3,
9(4)421,
10(2)5,
10(3)12,
10(4)2,
10(4)3,
10(4)5,
11(2)1,
11(2)3,
11(3)13,
11(4)18,
11(4)21,
12(2)11,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
13(1)9,
13(1)10,
13(3)27,
13(4)40,
14(1)12,
14(3)25,
14(4)31,
15(1)2,
15(2)7,
15(2)10,
15(3)13,
16(1)4,
17(1)2,
17(2)8,
17(3)11,
17(4)13,
17(4)14,
18(1)4,
18(3)10,
18(3)11
- small,
2(3)295,
10(3)11,
10(4)3,
10(4)5,
12(1)6,
12(3)15,
12(3)16,
12(3)18,
12(4)21,
14(1)12,
15(1)3,
15(1)4,
16(1)1,
17(4)15,
18(2)5
- strategy,
6(1)1,
8(1)78,
10(3)12,
10(4)1,
11(1)2,
11(3)15,
11(4)19
- subset,
12(1)6,
16(1)4,
16(4)17,
17(3)9,
17(4)13
- than,
2(1)3,
2(1)65,
2(3)332,
9(4)391,
9(4)461,
10(1)4,
11(2)3,
11(2)6,
11(3)14,
12(1)1,
12(2)10,
12(3)16,
12(4)22,
13(1)10,
13(3)21,
13(4)29,
13(4)31,
13(4)35,
14(3)27,
14(4)31,
15(1)5,
15(2)9,
15(2)10,
15(4)16,
16(2)8,
16(4)17,
17(1)2,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
17(4)16,
18(4)13
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- variety,
2(4)354,
10(3)11,
10(3)12,
14(1)10,
14(3)27,
16(2)5,
18(3)10
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
2(4)416,
9(4)461,
10(4)3,
10(4)4,
11(1)2,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
16(3)10,
16(3)11,
16(4)17,
17(2)6
- well,
1(1)93,
10(1)2,
10(2)8,
10(3)11,
10(3)12,
11(1)3,
11(1)4,
11(2)5,
11(3)15,
12(1)1,
12(1)3,
12(1)5,
12(2)10,
13(1)10,
13(3)26,
14(1)3,
14(1)5,
14(1)14,
14(3)23,
15(3)12,
15(4)16,
15(4)18,
16(2)8,
17(3)9,
17(3)10,
17(3)11,
18(1)3,
18(2)5
- while,
2(3)230,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)17,
16(3)9,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1,
18(2)7
- wide,
11(4)19,
12(3)14,
13(3)21,
14(1)10,
15(1)2,
16(2)5,
16(2)7,
16(4)14,
16(4)17,
17(4)16
- work,
2(2)138,
2(3)269,
2(4)416,
10(3)10,
10(4)6,
11(2)2,
11(2)3,
11(3)15,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(2)12,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)17,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13
- world, real-,
2(2)159,
14(1)10,
16(4)14,
16(4)16,
18(2)7