Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3450569.3463566acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

RMPlib: A Library of Benchmarks for the Role Mining Problem

Published: 11 June 2021 Publication History

Abstract

Role Based Access Control is a widely spread concept in cyber security. Thus, the (NP-complete) Role Mining Problem (RMP), which consists of finding an optimal set of roles and a corresponding assignment of those roles to users, is of great scientific interest. Over the last years, different algorithms have been developed to search for good solutions to the RMP. However, conclusive benchmarks for thorough comparison of the developed methods are rarely known. This paper introduces to RMPlib, a library for the Role Mining Problem, containing a set of new industry-oriented benchmark instances partly taken from real-world use cases, partly created synthetically. Access to RMPlib is provided through a platform where researchers can actively contribute new benchmark instances and best solutions, such that the library adapts to the changing requirements in science. The current version of RMPlib can be found at https://github.com/RMPlib/RMPlib.

References

[1]
Simon Anderer, Daniel Kreppein, Bernd Scheuermann, and Sanaz Mostaghim. 2020. The addRole-EA: A New Evolutionary Algorithm for the Role Mining Problem. In Proceedings of the 12th International Joint Conference on Computational Intelligence, IJCCI 2020, Budapest, Hungary, November 2--4, 2020, Juan Julián Merelo Guervós, Jonathan M. Garibaldi, Christian Wagner, Thomas Back, Kurosh Madani, and Kevin Warwick (Eds.). SCITEPRESS, 155--166. https://doi.org/10.5220/0010025401550166
[2]
Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. 2000. TRBAC: A Temporal Role-Based Access Control Model. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control (Berlin, Germany) (RBAC '00). Association for Computing Machinery, New York, NY, USA, 21--30. https://doi.org/10.1145/344287.344298
[3]
Alessandro Colantonio, Roberto Di Pietro, and Alberto Ocello. 2008. A cost-driven approach to role engineering. In Proceedings of the 2008 ACM symposium on Applied computing - SAC '08, Roger L. Wainwright and Hisham M. Haddad (Eds.). ACM Press, New York, New York, USA, 2129--2136. https://doi.org/10.1145/1363686.1364198
[4]
Alina Ene, William Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, and Robert E. Tarjan. 2008. Fast exact and heuristic methods for role minimization problems. In Proceedings of the 13th ACM symposium on Access control models and technologies - SACMAT '08, Indrakshi Ray and Ninghui Li (Eds.). ACM Press, New York, New York, USA, 1--10. https://doi.org/10.1145/1377836.1377838
[5]
Michael Gallaher, Alan O'Connor, Brian Kropp, and Gregory Tassey. 2002. The economic impact of role-based access control. Technical Report. National Institute of Standards and Technology (NIST).
[6]
Hejiao Huang, Feng Shang, Jinling Liu, and Hongwei Du. 2015. Handling least privilege problem and role mining in RBAC. Journal of Combinatorial Optimization, Vol. 30, 1 (2015), 63--86. https://doi.org/10.1007/s10878-013--9633--9
[7]
Martin Kuhlmann, Dalia Shohat, and Gerhard Schimpf. 2003. Role mining - revealing business roles for security administration using data mining technology. In Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03, Elena Ferrari and David Ferraiolo (Eds.). ACM Press, New York, New York, USA, 179--186. https://doi.org/10.1145/775412.775435
[8]
Ninghui Li, Mahesh V. Tripunitara, and Ziad Bizri. 2007. On Mutually Exclusive Roles and Separation-of-Duty. ACM Trans. Inf. Syst. Secur., Vol. 10, 2 (May 2007), 5--es. https://doi.org/10.1145/1237500.1237501
[9]
Haibing Lu, Jaideep Vaidya, and Vijayalakshmi Atluri. 2014. An optimization framework for role mining. Journal of Computer Security, Vol. 22, 1 (2014), 1--31. https://doi.org/10.3233/JCS-130484
[10]
Barsha Mitra, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. 2016. A Survey of Role Mining. Comput. Surveys, Vol. 48, 4 (2016), 1--37. https://doi.org/10.1145/2871148
[11]
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, and Jorge Lobo. 2008. Mining roles with semantic meanings. In Proceedings of the 13th ACM symposium on Access control models and technologies - SACMAT '08, Indrakshi Ray and Ninghui Li (Eds.). ACM Press, New York, New York, USA, 21--30. https://doi.org/10.1145/1377836.1377840
[12]
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, and Jorge Lobo. 2009. Evaluating role mining algorithms. In Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09, Barbara Carminati and James Joshi (Eds.). ACM Press, New York, New York, USA, 95--104. https://doi.org/10.1145/1542207.1542224
[13]
Igor Saenko and Igor Kotenko. 2011. Genetic Algorithms for Role Mining Problem. In 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing. IEEE, 646--650. https://doi.org/10.1109/PDP.2011.63
[14]
Igor Saenko and Igor Kotenko. 2016. Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes. In Proceedings of the 1st International Workshop on AI for Privacy and Security - PrAISe '16, Unknown (Ed.). ACM Press, New York, New York, USA, 1--9. https://doi.org/10.1145/2970030.2970033
[15]
Igor Saenko and Igor Kotenko. 2018. Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks. ACM Transactions on Internet Technology, Vol. 18, 3 (2018), 1--21. https://doi.org/10.1145/3093898
[16]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. 1996. Role-based access control models. Computer, Vol. 29, 2 (1996), 38--47. https://doi.org/10.1109/2.485845
[17]
Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. 2015. Role Mining in the Presence of Separation of Duty Constraints. In Proceedings of the 11th International Conference on Information Systems Security - Volume 9478 (Kolkata, India) (ICISS 2015). Springer-Verlag, Berlin, Heidelberg, 98--117. https://doi.org/10.1007/978--3--319--26961-0_7
[18]
Jürgen Schlegelmilch and Ulrike Steffens. 2005. Role mining with ORCA. In Proceedings of the tenth ACM symposium on Access control models and technologies - SACMAT '05, Elena Ferrari and Gail-Joon Ahn (Eds.). ACM Press, New York, New York, USA, 168--176. https://doi.org/10.1145/1063979.1064008
[19]
Jaideep Vaidya, Vijayalakshmi Atluri, and Qi Guo. 2007. The role mining problem. In Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07, Volkmar Lotz and Bhavani Thuraisingham (Eds.). ACM Press, New York, New York, USA, 175--184. https://doi.org/10.1145/1266840.1266870
[20]
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner, and Qi Guo. 2010. Role Engineering via Prioritized Subset Enumeration. IEEE Transactions on Dependable and Secure Computing, Vol. 7, 3 (2010), 300--314. https://doi.org/10.1109/TDSC.2008.61
[21]
Verizon. 2019. Data Breach Investigations Report 2019. Computer Fraud & Security, Vol. 2019, 6 (2019), 4. https://doi.org/10.1016/S1361--3723(19)30060-0
[22]
Zhongyuan Xu and Scott D. Stoller. 2012. Algorithms for mining meaningful roles. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12, Vijay Atluri, Jaideep Vaidya, Axel Kern, and Murat Kantarcioglu (Eds.). ACM Press, New York, New York, USA, 57--66. https://doi.org/10.1145/2295136.2295146
[23]
Dana Zhang, Kotagiri Ramamohanarao, and Tim Ebringer. 2007. Role engineering using graph optimisation. In Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07, Volkmar Lotz and Bhavani Thuraisingham (Eds.). ACM Press, New York, New York, USA, 139--144. https://doi.org/10.1145/1266840.1266862

Cited By

View all
  • (2025)IRMAOC: an interpretable role mining algorithm based on overlapping clusteringCybersecurity10.1186/s42400-024-00348-z8:1Online publication date: 27-Jan-2025
  • (2024)Survival Strategies for Evolutionary Role Mining Algorithms Using Expert KnowledgeProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3654183(623-626)Online publication date: 14-Jul-2024
  • (2024)Multi-Attribute Based Access Control Policy Generation Method2024 5th International Conference on Electronic Communication and Artificial Intelligence (ICECAI)10.1109/ICECAI62591.2024.10675285(522-525)Online publication date: 31-May-2024
  • Show More Cited By

Index Terms

  1. RMPlib: A Library of Benchmarks for the Role Mining Problem

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies
    June 2021
    194 pages
    ISBN:9781450383653
    DOI:10.1145/3450569
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RBAC
    2. benchmarking
    3. role-mining problem

    Qualifiers

    • Research-article

    Conference

    SACMAT '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 23 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)IRMAOC: an interpretable role mining algorithm based on overlapping clusteringCybersecurity10.1186/s42400-024-00348-z8:1Online publication date: 27-Jan-2025
    • (2024)Survival Strategies for Evolutionary Role Mining Algorithms Using Expert KnowledgeProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3654183(623-626)Online publication date: 14-Jul-2024
    • (2024)Multi-Attribute Based Access Control Policy Generation Method2024 5th International Conference on Electronic Communication and Artificial Intelligence (ICECAI)10.1109/ICECAI62591.2024.10675285(522-525)Online publication date: 31-May-2024
    • (2024)Studies on Multi-objective Role Mining in ERP SystemsEvolutionary Computation in Combinatorial Optimization10.1007/978-3-031-57712-3_6(81-96)Online publication date: 2024
    • (2023)An improved minimal noise role mining algorithm based on role interpretabilityComputers and Security10.1016/j.cose.2023.103100127:COnline publication date: 1-Apr-2023
    • (2023)Dynamic Optimization of Role Concepts for Role-Based Access Control Using Evolutionary AlgorithmsSN Computer Science10.1007/s42979-023-01805-14:4Online publication date: 24-May-2023
    • (2023)Evolutionary Optimization of Roles for Access Control in Enterprise Resource Planning SystemsComputational Intelligence10.1007/978-3-031-46221-4_1(1-23)Online publication date: 3-Nov-2023
    • (2022)The Secrecy Resilience of Access Control Policies and Its Application to Role MiningProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535030(115-126)Online publication date: 7-Jun-2022
    • (2022)A Genetic Algorithm For Boolean Semiring Matrix Factorization With Applications To Graph Mining2022 IEEE International Conference on Big Data (Big Data)10.1109/BigData55660.2022.10020828(3864-3870)Online publication date: 17-Dec-2022
    • (2022)Evolutionary Algorithms for the Constrained Two-Level Role Mining ProblemEvolutionary Computation in Combinatorial Optimization10.1007/978-3-031-04148-8_6(79-94)Online publication date: 20-Apr-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media