CFP last date
20 May 2024
Reseach Article

A Novel Heuristic Algorithm for Visualizing User Roles

Published on March 2013 by C. Ranjith Kumar, S. Selva Brinda
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 1
March 2013
Authors: C. Ranjith Kumar, S. Selva Brinda
e66994cd-d8d7-4758-b446-694e6222e0ee

C. Ranjith Kumar, S. Selva Brinda . A Novel Heuristic Algorithm for Visualizing User Roles. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 1 (March 2013), 14-18.

@article{
author = { C. Ranjith Kumar, S. Selva Brinda },
title = { A Novel Heuristic Algorithm for Visualizing User Roles },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 1 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 14-18 },
numpages = 5,
url = { /proceedings/icicic2013/number1/11286-0121/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A C. Ranjith Kumar
%A S. Selva Brinda
%T A Novel Heuristic Algorithm for Visualizing User Roles
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 1
%P 14-18
%D 2013
%I International Journal of Computer Applications
Abstract

In today's world commercial security and unique management products is highly adopted to role based access control (RBAC). Currently visualizing the user roles instead of raw data will make a significant impact in business trends. Earlier process used many heuristic algorithms with which visual role mining was achieved whereas the amount of noise within the data and correlation among roles made it is limited. To overcome the drawbacks of the above technique we proposed two algorithms: ZOOMING & DATA FILTERING. The later proposed a technique is used for the issue of reducing the noise among the data. Secondly, a novel algorithm is framed for visualizing a single user in multiple domain roles. Results will be demonstrated by using real time data.

References
  1. Alessandro Colantonio, Roberto Di Pietro,Alberto Ocello, Nino Vincenzo Verde, "Visual Role Mining:A Picture Is Worth a Thousand Roles", IEEE Transactions on knowledge and data engineering, vol. 24, no. 6, june 2012
  2. S. De Capitani Di Vimercati, S. Foresti, P. Samarati, and S. Jajodia,"Access Control Policies and Languages," Int'l J. Computational Science and Eng. , vol. 3, no. 2, pp. 94-102, 2007.
  3. J. Vaidya, V. Atluri, and J. Warner, "RoleMiner: Mining Roles Using Subset Enumeration," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 144-153, 2006.
  4. I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo, "Evaluating Role Mining Algorithms," Proc. 14th ACM Symp. Access Control Models and Technologies (SACMAT '09), pp. 95-104, 2009.
  5. J. Vaidya, V. Atluri, and Q. Guo, "The Role Mining Problem: Finding a Minimal Descriptive Set of Roles," Proc. 12th ACM Symp. Access Control Models and Technologies (SACMAT '07), pp. 175-184, 2007.
  6. A. Colantonio, R. Di Pietro, A. Ocello, and N. V. Verde, "A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems," Proc. 14th ACM Symp. Access Control Models and Technologies (SACMAT '09), pp. 85-94, 2009.
  7. M. Frank, D. Basin, and J. M. Buhmann, "A Class of Probabilistic Models for Role Engineering," Proc. 15th ACM Conf. Computer and Comm. Security (CCS '08), pp. 299-310, 2008.
  8. J. Vaidya, V. Atluri, and J. Warner, "RoleMiner: Mining Roles Using Subset Enumeration," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 144-153, 2006.
  9. M. Frank, A. P. Streich, D. Basin, and J. M. Buhmann, "A Probabilistic Approach to Hybrid Role Mining," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 101-111, 2009.
  10. A. Colantonio, R. Di Pietro, A. Ocello, and N. V. Verde, "Mining Business-Relevant RBAC States through Decomposition," Proc. Security and Privacy-Silver Linings in the Cloud, pp. 19-30, 2010.
  11. R. Gupta, G. Fang, B. Field, M. Steinbach, and V. Kumar, "Quantitative Evaluation of Approximate Frequent Pattern Mining Algorithms," Proc. 14th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '08), pp. 301-309, 2008.
  12. A. Colantonio, R. Di Pietro, and A. Ocello, "Leveraging Lattices to Improve Role Mining," Proc. IFIP 23rd Int'l Information Security Conf. , pp. 333-347, 2008.
  13. A. Colantonio, R. Di Pietro, A. Ocello, and N. V Verde, "A New Role Mining Framework to Elicit Business Roles and to Mitigate Enterprise Risk," Decision Support Systems, vol. 50, no. 4, pp. 715- 731, 2010.
  14. Cungang Yang, "An Object Oriented Role-based Access Control Model for Secure Domain Environments," International Journal of Network Security, Vol. 4, No. 1, pp. 10–16, 2007.
  15. D. A. Keim, G. Andrienko, J. -D. Fekete, C. Go¨ rg, J. Kohlhammer, and G. Melanc¸on, "Visual Analytics: Definition, Process, and Challenges," Information Visualization: Human-Centered Issues and Perspectives, vol. 4950, pp. 154-175, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining Role Mining Role Based Access Control Multi Domains