Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jul 27, 2016 · Abstract: Role mining has been extensively used to automatically generate roles for role-based access control. Nevertheless, the two core ...
We tackle the problem from a fresh angle. Instead of developing fast role mining algorithms, we adopt a data-centric approach that quickly estimates the bounds ...
ABSTRACT. Analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control. (RBAC) in an enterprise.
This work adopts a data-centric approach that quickly estimates the bounds on optimal role mining results without actually running any role mining algorithm ...
goals of role mining, namely role minimization and edge concentration, we proposed corresponding performance metrics for quality of role mining results,.
A promising approach to role engineering is role mining, which uses data mining techniques to nd an RBAC system from existing permission assignment data.
A Data-Centric Approach to Quality Estimation of Role Mining Results. Article ... Instead of developing fast role mining algorithms, we adopt a data-centric ...
A comprehensive evaluation framework is used to compare six role mining algorithms from several aspects such as weighted structural comp-lexity(WSC), ...
A Data-Centric Approach to Quality Estimation of Role Mining Results. Article ... Instead of developing fast role mining algorithms, we adopt a data-centric ...
Jul 24, 2019 · This quick turn-around is key to quality rules in your decision management projects. When data contains expected results, this data-centric ...