Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ACSAC.2009.11guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

RoleVAT: Visual Assessment of Practical Need for Role Based Access Control

Published: 07 December 2009 Publication History

Abstract

Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC requires role engineering, the identification of a set of roles that offer administrative benefit. However, establishing that RBAC is desirable in a given enterprise is lacking in current role engineering processes. To help identify the practical need for RBAC, we propose RoleVAT, a Role engineering tool for the Visual Assessment of user and permission Tendencies. User and permission clusters can be visually identified as potential user groups or roles. The benefit and impact of this visual analysis in enterprise environments is discussed and demonstrated through testing on real life as well as synthetic datasets. Our experimental results show the effectiveness of RoleVAT as well as interesting user and role tendencies in real enterprise environments.

Cited By

View all
  • (2016)A Survey of Role MiningACM Computing Surveys10.1145/287114848:4(1-37)Online publication date: 22-Feb-2016
  • (2014)Anomaly detection and visualization in generative RBAC modelsProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613105(41-52)Online publication date: 25-Jun-2014
  • (2014)An actor-based, application-aware access control evaluation frameworkProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613099(199-210)Online publication date: 25-Jun-2014
  • Show More Cited By

Index Terms

  1. RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
    December 2009
    492 pages
    ISBN:9780769539195

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 07 December 2009

    Author Tags

    1. cluster tendency analysis
    2. clustering
    3. data mining
    4. role based access control
    5. role engineering
    6. role mining

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)A Survey of Role MiningACM Computing Surveys10.1145/287114848:4(1-37)Online publication date: 22-Feb-2016
    • (2014)Anomaly detection and visualization in generative RBAC modelsProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613105(41-52)Online publication date: 25-Jun-2014
    • (2014)An actor-based, application-aware access control evaluation frameworkProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613099(199-210)Online publication date: 25-Jun-2014
    • (2014)On the suitability of dissemination-centric access control systems for group-centric sharingProceedings of the 4th ACM conference on Data and application security and privacy10.1145/2557547.2557566(1-12)Online publication date: 3-Mar-2014
    • (2011)An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)Proceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943530(121-132)Online publication date: 21-Feb-2011
    • (2010)On the definition of role miningProceedings of the 15th ACM symposium on Access control models and technologies10.1145/1809842.1809851(35-44)Online publication date: 9-Jun-2010

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media