TY - GEN
T1 - Mining roles from web application usage patterns
AU - Gal-Oz, Nurit
AU - Gonen, Yaron
AU - Yahalom, Ran
AU - Gudes, Ehud
AU - Rozenberg, Boris
AU - Shmueli, Erez
PY - 2011/9/20
Y1 - 2011/9/20
N2 - Role mining refers to the problem of discovering an optimal set of roles from existing user permissions. In most role mining algorithms, the full set of user-permission assignments (UPA) is given as input. The challenge we are facing in the current paper is mining roles from actual web-application usage information. This information is collected by monitoring the access of users to application during a period of time. We analyze the actual permissions required to access the application in each user's session, and construct a set of user-permission assignments, which result in an incomplete UPA. We propose an algorithm that uses the session permission information to overcome the deficient data. We show by example how each step of the algorithm overcomes by heuristic instances of higher uncertainty. We demonstrate by simulation the efficiency of our algorithm in handling different levels of deficient data.
AB - Role mining refers to the problem of discovering an optimal set of roles from existing user permissions. In most role mining algorithms, the full set of user-permission assignments (UPA) is given as input. The challenge we are facing in the current paper is mining roles from actual web-application usage information. This information is collected by monitoring the access of users to application during a period of time. We analyze the actual permissions required to access the application in each user's session, and construct a set of user-permission assignments, which result in an incomplete UPA. We propose an algorithm that uses the session permission information to overcome the deficient data. We show by example how each step of the algorithm overcomes by heuristic instances of higher uncertainty. We demonstrate by simulation the efficiency of our algorithm in handling different levels of deficient data.
UR - http://www.scopus.com/inward/record.url?scp=80052797443&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-22890-2_11
DO - 10.1007/978-3-642-22890-2_11
M3 - Conference contribution
AN - SCOPUS:80052797443
SN - 9783642228896
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 125
EP - 137
BT - Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Proceedings
T2 - 8th International Conference on Trust Privacy and Security in Digital Business, TrustBus 2011
Y2 - 29 August 2011 through 2 September 2011
ER -