首页 | 本学科首页   官方微博 | 高级检索  
     


Permission and role automatic assigning of user in role-based access control
Authors:Dao-jun Han  Han-kui Zhuo  Lan-ting Xia and Lei Li
Affiliation:1. Software Research Institute, Sun Yat-sen University, Guangzhou 510275, China; 2. Institute of Data and Knowledge Engineering, Henan University, Kaifeng 475004, China; 3. NetCraft Information Technology (Macau) Co., Ltd., Macau
Abstract:Role mining and setup affect the usage of role-based access control (RBAC). Traditionally, user’s role and permission assigning are manipulated by security administrator of system. However, the cost is expensive and the operating process is complex. A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems. The relation among sets of permissions, roles and users was explored by generating mappings, and the relation between sets of users and attributes was analyzed by means of the concept lattice model, generating a critical mapping between the attribute and permission sets, and making the meaning of the role natural and operational. Thus, a role is determined by permission set and user’s attributes. The generated mappings were used to automatically assign permissions and roles to new users. Experimental results show that the proposed algorithm is effective and efficient.
Keywords:role-based access control  role  permission assignment  concept lattice
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号