Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)

  • Authors:
  • Ravi Mukkamala;Vishnu Kamisetty;Pawankumar Yedugani

  • Affiliations:
  • Department of Computer Science, Norfolk, Old Dominion University, Virginia, USA 23529-0162;Department of Computer Science, Norfolk, Old Dominion University, Virginia, USA 23529-0162;Department of Computer Science, Norfolk, Old Dominion University, Virginia, USA 23529-0162

  • Venue:
  • ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Role Based Access Control (RBAC) systems, formulating a correct set of roles, assigning appropriate privileges to roles, and assigning roles to users are the fundamental design tasks. Whether these tasks are performed by a human (e.g., system administrator) or by a machine (e.g., expert system), misconfigurations are likely to occur. The misconfigurations could manifest as under-privileges (fewer privileges assigned) or over-privileges (more privileges than necessary). In this paper, we describe an approach based on role mining to detect and correct such misconfigurations. Here, the overlap among the users and privileges of different roles is used to identify possible misconfigurations.