Back to Search
Start Over
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)
- Source :
- Information Systems Security ISBN: 9783642107719, ICISS
- Publication Year :
- 2009
- Publisher :
- Springer Berlin Heidelberg, 2009.
-
Abstract
- In Role Based Access Control (RBAC) systems, formulating a correct set of roles, assigning appropriate privileges to roles, and assigning roles to users are the fundamental design tasks. Whether these tasks are performed by a human (e.g., system administrator) or by a machine (e.g., expert system), misconfigurations are likely to occur. The misconfigurations could manifest as under-privileges (fewer privileges assigned) or over-privileges (more privileges than necessary). In this paper, we describe an approach based on role mining to detect and correct such misconfigurations. Here, the overlap among the users and privileges of different roles is used to identify possible misconfigurations.
- Subjects :
- Software_OPERATINGSYSTEMS
business.industry
Computer science
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
Short paper
Access control
computer.software_genre
Computer security
Expert system
Set (abstract data type)
System administrator
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Role-based access control
business
computer
Subjects
Details
- ISBN :
- 978-3-642-10771-9
- ISBNs :
- 9783642107719
- Database :
- OpenAIRE
- Journal :
- Information Systems Security ISBN: 9783642107719, ICISS
- Accession number :
- edsair.doi...........62b5a28e70b9fa7ddbb62717fbc95065