Abstract
Dealing with the risks in information sharing technology, role based access control(RBAC) mechanism has more advantages than traditional access control mechanism like DAC and MAC. Role takes core position in both building, maintaining the architecture of the RBAC system and migrating the non-RBAC system to the RBAC system. Then role engineering is proposed to find the appropriate roles for the RBAC system. Role mining problem, as an automatic way to find the roles, has been a hotspot for the role engineering. In this paper, we briefly introduce the basic definition of RBAC. A contribution of this paper is to classify some of the exist method into clustering methods and Binary Matrix Decomposition Method. We also evaluate some of these methods on both real-world data and experimental data. At last, we analyze the results to find out what differences may appear using different method and dataset.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have