skip to main content
10.1145/1377836.1377838acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Fast exact and heuristic methods for role minimization problems

Published:11 June 2008Publication History

ABSTRACT

We describe several new bottom-up approaches to problems in role engineering for Role-Based Access Control (RBAC). The salient problems are all NP-complete, even to approximate, yet we find that in instances that arise in practice these problems can be solved in minutes. We first consider role minimization, the process of finding a smallest collection of roles that can be used to implement a pre-existing user-to-permission relation. We introduce fast graph reductions that allow recovery of the solution from the solution to a problem on a smaller input graph. For our test cases, these reductions either solve the problem, or reduce the problem enough that we find the optimum solution with a (worst-case) exponential method. We introduce lower bounds that are sharp for seven of nine test cases and are within 3.4% on the other two. We introduce and test a new polynomial-time approximation that on average yields 2% more roles than the optimum. We next consider the related problem of minimizing the number of connections between roles and users or permissions, and we develop effective heuristic methods for this problem as well. Finally, we propose methods for several related problems.

References

  1. J.A. Bondy and U.S.R. Murty. Graph Theory with Applications. North Holland, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Cornaz and J. Fonlupt. Chromatic characterization of biclique covers. Discrete Mathematics, 306(5):495--507, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Edward J. Coyne. Role engineering. In RBAC '95: Proceedings of the first ACM Workshop on Role-based access control, page 4. ACM, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alina Ene. Biclique Covers of Bipartite Graphs: The Minimum Biclique Cover and Edge Concentration Problems. 2007. Princeton University.Google ScholarGoogle Scholar
  5. M.P. Gallagher, A. O'Connor, and B. Kropp. The economic impact of role-based access control. Technical Report Planning Report 02-1, National Institute of Standards and Technology, March 2002.Google ScholarGoogle Scholar
  6. Floris Geerts, Bart Goethals, and Taneli Mielikäinen. Tiling databases. In Discovery Science, volume 3245 of Lecture Notes in Computer Science, pages 278--289. Springer-Verlag, 2004.Google ScholarGoogle Scholar
  7. John E. Hopcroft and Richard M. Karp. An n 5<over>2 algorithm for maximum matchings in bipartite graphs. SIAM Journal on Computing, 2(4):225--231, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In SACMAT '03, pages 179--186. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. V.S. Anil Kumar and H. Ramesh. Covering rectilinear polygons with axis-parallel rectangles. SIAM Journal on Computing, 32(6):1509--1541, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Lin. On the computational complexity of edge concentration. Discrete Applied Mathematics, 101(1):197--205, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Lund and M. Yannakakis. On the hardness of approximating minimization problems. JACM, 14(5):960--981, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Mehrotra and M.A. Trick. A column generation approach for graph coloring. INFORMS Journal on Computing, 8(4):344--354, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Muller. Alternating cycle-free matchings. Order, 7(1):11--21, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  14. J.B. Orlin. Contentment in graph theory: covering graphs with cliques. Indagationes Mathematicae, 39:406--424, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  15. R. Peeters. The maximum edge biclique is NP-complete. Discrete Applied Mathematics, 131(3):651--654, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Rymon. Method and apparatus for role grouping by shared resource utilization. U.S. Patent Application 20030172161, September 2003.Google ScholarGoogle Scholar
  17. J. Schlegelmilch and U. Steffens. Role mining with ORCA. In SACMAT '05, pages 168--176. ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Daluss J. Siewert. Biclique covers and partitions of bipartite graphs and digraphs and related matrix ranks of f0; 1g matrices. PhD thesis, The University of Colorado at Denver, 2000.Google ScholarGoogle Scholar
  19. H.U. Simon. On approximate solutions for combinatorial optimization problems. SIAM J. Disc. Math., 3(2):294--310, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  20. U.S. Department of Veteran's Affairs. Licensed Providers Permission Table. http://www.va.gov/rbac/docs/20050120PermissionTablesLicensedProviders.doc.Google ScholarGoogle Scholar
  21. J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: Finding a minimal descriptive set of roles. In SACMAT '07, pages 175--184. ACM Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Vaidya, V. Atluri, and J. Warner. Roleminer: Mining roles using subset enumeration. In ACM CCS '06, pages 144--153. ACM Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Zhang, K. Ramamohanarao, and T. Ebringer. Role engineering using graph optimisation. In SACMAT'07, pages 139--144. ACM Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fast exact and heuristic methods for role minimization problems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
          June 2008
          214 pages
          ISBN:9781605581293
          DOI:10.1145/1377836

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 June 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader