Role Mining In Business: Taming Role-based Access Control Administration

Role Mining In Business: Taming Role-based Access Control Administration
Author: Roberto Di Pietro
Publisher: World Scientific
Total Pages: 295
Release: 2012-02-20
Genre: Computers
ISBN: 9814458104


Download Role Mining In Business: Taming Role-based Access Control Administration Book in PDF, Epub and Kindle

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) — a policy-neutral access control model that serves as a bridge between academia and industry — is probably the most suitable security model for commercial applications.Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems.Among role engineering approaches, searching through access control systems to find de facto roles embedded in existing permissions is attracting increasing interest. The focus falls on role mining, which is applied data mining techniques to automate — to the extent possible — the role design task.This book explores existing role mining algorithms and offers insights into the automated role design approaches proposed in the literature. Alongside theory, this book acts as a practical guide for using role mining tools when implementing RBAC. Besides a comprehensive survey of role mining techniques deeply rooted in academic research, this book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.Among the pioneering works on role mining, this book blends business elements with data mining theory, and thus further extends the applications of role mining into business practice. This makes it a useful guide for all academics, IT and business professionals.


Role Mining In Business: Taming Role-based Access Control Administration
Language: en
Pages: 295
Authors: Roberto Di Pietro
Categories: Computers
Type: BOOK - Published: 2012-02-20 - Publisher: World Scientific

GET EBOOK

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies
Role-based Access Control
Language: en
Pages: 344
Authors: David Ferraiolo
Categories: Business & Economics
Type: BOOK - Published: 2003 - Publisher: Artech House

GET EBOOK

The authors explain role based access control (RBAC), its administrative and cost advantages, implementation issues and imigration from conventional access cont
Security and Privacy - Silver Linings in the Cloud
Language: en
Pages: 329
Authors: Kai Rannenberg
Categories: Computers
Type: BOOK - Published: 2010-09-02 - Publisher: Springer Science & Business Media

GET EBOOK

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this
Data and Applications Security and Privacy XXIV
Language: en
Pages: 386
Authors: Sara Foresti
Categories: Computers
Type: BOOK - Published: 2010-08-24 - Publisher: Springer

GET EBOOK

This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The
Methodology for Hybrid Role Development
Language: en
Pages: 274
Authors: Ludwig Fuchs
Categories: Business & Economics
Type: BOOK - Published: 2010 - Publisher: BoD – Books on Demand

GET EBOOK

"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate internati