Role mining - revealing business roles for security administration using data mining technology

  • Authors:
  • Martin Kuhlmann;Dalia Shohat;Gerhard Schimpf

  • Affiliations:
  • SYSTOR Security Solutions GmbH, Hermann-Heinrich-Gossen-Strasse 3, Cologne;SYSTOR Security Solutions GmbH, Hermann-Heinrich-Gossen-Strasse 3, Cologne;SMF TEAM IT-Security Consulting, Am Waldweg 23, Pforzheim

  • Venue:
  • Proceedings of the eighth ACM symposium on Access control models and technologies
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems.