Paper Title:
Mining Least Privilege Roles by Genetic Algorithm
  Abstract

Role-based access control (RBAC) has been adopted widely by reducing the complexity of the management of access control. The least privilege principle is a very important constraint policy of RBAC. A key problem related to this is the notion of goodness/interestingness – when is a role good? Devising a complete and correct set of roles for supporting the least privilege principle has been recognized as one of the most important tasks in implementing RBAC. In this paper, to address this problem, we map this problem to a formal definition in mathematics – δ-approx least privilege mining (δ-approx LPM). We introduce a method named GABM to enforce LPM based on the generic algorithm. By GABM, the least privilege roles can be found out correctly. Our experiments display the effect of GABM. Finally, we conclude our work.

  Info
Periodical
Chapter
Chapter 8: System Modeling and Simulation
Edited by
Dongye Sun, Wen-Pei Sung and Ran Chen
Pages
4508-4512
DOI
10.4028/www.scientific.net/AMM.121-126.4508
Citation
L. J. Dong, M. C. Wang, X. J. Kang, "Mining Least Privilege Roles by Genetic Algorithm", Applied Mechanics and Materials, Vols. 121-126, pp. 4508-4512, 2012
Online since
October 2011
Export
Price
$35.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Peng Li, Yan Jun
Abstract:In the architecture of wireless sensor network, routing technology at the network layer is essential. Since the clustering routing leads in...
2245
Authors: Yong Luo Shen, Jun Zhang, Di Wei Yang, Lin Bo Luo
Chapter 15: Information Security Technology
Abstract:In this paper, we propose a novel key management scheme based on Bezier curves for hierarchical wireless sensor networks (WSNs). The design...
2979
Authors: Wen Jun Liu, Jian Xi Fan, Shu Kui Zhang, Yan Wang, Xi Wang
Chapter 2: Sensors and Navigation Engineering
Abstract:Study has shown that clustering in Wireless Sensor Networks can provide well scalability and robustness. Recently, mobile collector (MC) is...
261
Authors: Chie Dou, Yu Hui Chang, Jia Siang Ruan
Chapter 5: Advanced Development for Information Technologies and Engineering, Networks and Software Applications, Data Acquisition and Processing, Intelligent Systems
Abstract:Using an underlying cluster-based virtual backbone induced by the weakly connected dominating set (WCDS) is a very promising approach to...
929