Mining roles from web application usage patterns

Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

Role mining refers to the problem of discovering an optimal set of roles from existing user permissions. In most role mining algorithms, the full set of user-permission assignments (UPA) is given as input. The challenge we are facing in the current paper is mining roles from actual web-application usage information. This information is collected by monitoring the access of users to application during a period of time. We analyze the actual permissions required to access the application in each user's session, and construct a set of user-permission assignments, which result in an incomplete UPA. We propose an algorithm that uses the session permission information to overcome the deficient data. We show by example how each step of the algorithm overcomes by heuristic instances of higher uncertainty. We demonstrate by simulation the efficiency of our algorithm in handling different levels of deficient data.

Original languageEnglish
Title of host publicationTrust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Proceedings
Pages125-137
Number of pages13
DOIs
StatePublished - 20 Sep 2011
Event8th International Conference on Trust Privacy and Security in Digital Business, TrustBus 2011 - Toulouse, France
Duration: 29 Aug 20112 Sep 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6863 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Trust Privacy and Security in Digital Business, TrustBus 2011
Country/TerritoryFrance
CityToulouse
Period29/08/112/09/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Mining roles from web application usage patterns'. Together they form a unique fingerprint.

Cite this