Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2462410.2462431acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
demonstration

RMiner: a tool set for role mining

Published: 12 June 2013 Publication History

Abstract

Recently, there are many approaches proposed for mining roles using automated technologies. However, it lacks a tool set that can be used to aid the application of role mining approaches and update role states. In this demonstration, we introduce a tool set, RMiner, which is based on the core of WEKA, an open source data mining tool. RMiner implements most of the classic and latest role mining algorithms and provides interactive tools for administrator to update role states. The running examples of RMiner are presented to demonstrate the effectiveness of the tool set.

References

[1]
Bouckaert, R., Frank, E., Hall, M., Kirkby, R., Reutemann, P., Seewald, A., and Scuse, D. 2008. WEKA Manual for Version 3--6-0. University of Waikato, Hamilton, New Zealand, 2008.
[2]
Schlegelmilch, J., and Steffens, U. 2005. Role mining with ORCA. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (Stockholm, Sweden, June 2005). SACMAT'05, ACM, 168--176.
[3]
Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., and Lobo, J. 2008. Mining roles with semantic meanings. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (Estes Park, CO, USA, June 2008). SACMAT'08, ACM, 21--30.
[4]
Vaidya, J., Atluri, V., and Warner, J. 2006. Roleminer: mining roles using subset enumeration. In Proceedings of the 13th ACM Conference on Computer and Communications Security (Alexandria, VA, USA, October 2006 ). CCS'06. ACM, 144--153.
[5]
Ma, X., Li, R., Lu, Z., and Wang, W. 2012. Mining Constraints in Role-Based Access Control. Mathematical and Computer Modelling, Elsevier, 55, 1--2 (2012), 87--96.
[6]
Zhang, D., Ramamohanarao, K., and Ebringer, T. 2007. Role engineering using graph optimisation. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 2007). SACMAT'07, ACM, 139--144.
[7]
Ma, X., Li, R., Lu, Z. 2010. Role Mining Based on Weights. In Proceedings of the 15th ACM Symposium on Access Control Models and Technologies (Pittsburgh, PA, USA, June 2010). SACMAT'10, ACM, 65--74.

Cited By

View all
  • (2019)Role-Engineering Optimization with Cardinality Constraints and User-Oriented Mutually Exclusive ConstraintsInformation10.3390/info1011034210:11(342)Online publication date: 4-Nov-2019
  • (2019)Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for AuthorizationsFuture Internet10.3390/fi1109020111:9(201)Online publication date: 19-Sep-2019
  • (2019)R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud DataIEEE Access10.1109/ACCESS.2019.29415607(133274-133289)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
June 2013
278 pages
ISBN:9781450319508
DOI:10.1145/2462410
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. role engineering
  2. role mining
  3. role-based access control
  4. tool set

Qualifiers

  • Demonstration

Conference

SACMAT '13
Sponsor:

Acceptance Rates

SACMAT '13 Paper Acceptance Rate 19 of 62 submissions, 31%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Role-Engineering Optimization with Cardinality Constraints and User-Oriented Mutually Exclusive ConstraintsInformation10.3390/info1011034210:11(342)Online publication date: 4-Nov-2019
  • (2019)Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for AuthorizationsFuture Internet10.3390/fi1109020111:9(201)Online publication date: 19-Sep-2019
  • (2019)R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud DataIEEE Access10.1109/ACCESS.2019.29415607(133274-133289)Online publication date: 2019
  • (2017)A Survey on Access Control Mechanisms in E-commerce EnvironmentsProceedings of the 8th Balkan Conference in Informatics10.1145/3136273.3136288(1-6)Online publication date: 20-Sep-2017
  • (2016)A Survey of Role MiningACM Computing Surveys10.1145/287114848:4(1-37)Online publication date: 22-Feb-2016
  • (2014)Anomaly detection and visualization in generative RBAC modelsProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613105(41-52)Online publication date: 25-Jun-2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media