skip to main content
10.1145/1266840.1266870acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

The role mining problem: finding a minimal descriptive set of roles

Published:20 June 2007Publication History

ABSTRACT

Devising a complete and correct set of roles has been recognized as one of the most important and challenging tasks in implementing role based access control. A key problem related to this is the notion of goodness/interestingness -- when is a role good/interesting? In this paper, we define the role mining problem (RMP) as the problem of discovering an optimal set of roles from existing user permissions. The main contribution of this paper is to formally define RMP, and analyze its theoretical bounds. In addition to the above basic RMP, we introduce two different variations of the RMP, called the δ-approx RMP and the Minimal Noise RMP that have pragmatic implications. We reduce the known "set basis problem" to RMP to show that RMP is an NP-complete problem. An important contribution of this paper is also to show the relation of the role mining problem to several problems already identified in the data mining and data analysis literature. By showing that the RMP is in essence reducible to these known problems, we can directly borrow the existing implementation solutions and guide further research in this direction.

References

  1. C. Damm, K. H. Kim, and F. Roush. On covering and rank problems for boolean matrices and their applications. In Computing and Combinatorics: 5th Annual International Conference, COCOON '99,volume 1627 of Lecture Notes in Computer Science, pages 123--133. Springer-Verlag, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. J. Coyne. Role-engineering. In 1st ACM Workshop on Role-Based Access Control, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. TISSEC, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. P. Gallagher, A. O'Connor, and B. Kropp. The economic impact of role-based access control. Planning report 02-1, National Institute of Standards and Technology, March 2002.Google ScholarGoogle Scholar
  5. M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness, chapter 3. W. H. Freeman, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Geerts, B. Goethals, and T. Mielikainen. Tiling databases. In Discovery Science, Lecture Notes in Computer Science, pages 278--289. Springer-Verlag, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In W. Chen, J. Naughton, and P. A. Bernstein, editors, 2000 ACM SIGMOD Intl. Conference on Management of Data, pages 1--12. ACM Press, 05 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. S. Hochbaum. Approximating clique and biclique problems. J. Algorithms, 29(1):174--200, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the role life-cycle in the context of enterprise security management. In 7th ACM Symposium on Access Control Models and Technologies, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In Symposium on Access Control Models and Technologies (SACMAT). ACM, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Markowsky. Ordering d-classes and computing schein rank is hard. Semi-group Forum, 44:373--375, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  12. T. Mielikäinen. Intersecting data to closed sets with constraints. In B. Goethals and M. J. Zaki, editors, FIMI, volume 90 of CEUR Workshop Proceedings. CEUR-WS.org, 2003.Google ScholarGoogle Scholar
  13. P. Miettinen. The discrete basis problem, master's thesis. Master's thesis, University of Helsinki, 2006.Google ScholarGoogle Scholar
  14. P. Miettinen, T. Mielikainen, A. Gionis, G. Das, and H. Mannila. The discrete basis problem. In Knowledge Discovery in Databases: PKDD 2006, Lecture Notes in Artificial Intelligence, pages 335--346, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Mishra, D. Ron, and R. Swaminathan. On finding large conjunctive clusters. In Learning Theory and Kernel Machines: 16th Annual Conference on Learning Theory and 7th Kernel Workshop, COLT/Kernel 2003, volume 2777 of Lecture Notes in Computer Science, pages 448--462. Springer, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  16. F. Pan, G. Cong, A. K. H. Tung, J. Yang, and M. J. Zaki. Carpenter: finding closed patterns in long biological datasets. In KDD, pages 637--642, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Peeters. The maximum edge biclique problem is np-complete. Discrete Appl. Math., 131(3):651--654, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. S. Sandhu et al. Role-based Access Control Models. IEEE Computer, pages 38--47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Schaad, J. Moffett, and J. Jacob. The role-based access control system of a european bank: A case study and discussion. In Proceedings of ACM Symposium on Access Control Models and Technologies, pages 3--9, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Schlegelmilch and U. Steffens. Role mining with orca. In Symposium on Access Control Models and Technologies (SACMAT). ACM, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Vaidya, V. Atluri, and J. Warner. Roleminer: mining roles using subset enumeration. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 144--153, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The role mining problem: finding a minimal descriptive set of roles

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
          June 2007
          254 pages
          ISBN:9781595937452
          DOI:10.1145/1266840

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 June 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader