CFP last date
20 May 2024
Reseach Article

Article:Detect Discrepancy in Permission Assignments

by Bala Sundaresan, Anand Upendra, Rama Subramanian Sundaram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 31 - Number 8
Year of Publication: 2011
Authors: Bala Sundaresan, Anand Upendra, Rama Subramanian Sundaram
10.5120/3843-5345

Bala Sundaresan, Anand Upendra, Rama Subramanian Sundaram . Article:Detect Discrepancy in Permission Assignments. International Journal of Computer Applications. 31, 8 ( October 2011), 6-13. DOI=10.5120/3843-5345

@article{ 10.5120/3843-5345,
author = { Bala Sundaresan, Anand Upendra, Rama Subramanian Sundaram },
title = { Article:Detect Discrepancy in Permission Assignments },
journal = { International Journal of Computer Applications },
issue_date = { October 2011 },
volume = { 31 },
number = { 8 },
month = { October },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume31/number8/3843-5345/ },
doi = { 10.5120/3843-5345 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:17:34.706094+05:30
%A Bala Sundaresan
%A Anand Upendra
%A Rama Subramanian Sundaram
%T Article:Detect Discrepancy in Permission Assignments
%J International Journal of Computer Applications
%@ 0975-8887
%V 31
%N 8
%P 6-13
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most enterprise legacy applications tend to lack supportive or detailed documentation about the user access permissions defined in their systems. When a need arises to clean up data with some or no input about the permissions, a considerable amount of time and effort is consumed in understanding permissions and the discrepancy of their assignment in the system. This paper proposes an approach which would help mine the discrepancies in permission assignments in a given dataset with useful data representations leading to less time required for the user-access clean-up process. The present work also discusses the implementation of the approach through a case study.

References
  1. Chang-Joo Moon, Woojin Paik, Young-Gab Kim and Ju-Hum Kwon. "The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control" in Proc. Information Security and Cryptology Lecture Notes in Computer Science, 2005, Volume 3822/2005,pp. 265-278.
  2. Lengler R., Eppler M. “Towards A Periodic Table of Visualization Methods for Management,” in Proc IASTED Proceedings of the Conference on Graphics and Visualization in Engineering, 2007
  3. “Cluster Analysis.” Internet: http://www.statsoft.com/textbook/cluster-analysis/?button=1 [Jan. 05 2011]
  4. “Find Clusters.” Internet: http://reference.wolfram.com/mathematica/ref/FindClusters.html [Feb 16 2011]
  5. “Hierarchical Clustering Algorithms.” Internet: http://home.dei.polimi.it/matteucc/Clustering/tutorial_html/hierarchical.html [Mar. 15 2011]
Index Terms

Computer Science
Information Sciences

Keywords

Permission assignment discrepancy user privilege analysis RBAC Role Based Access Control entitlement discrepancy user authorization analysis