loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Simon Anderer 1 ; Alpay Sahin 1 ; Bernd Scheuermann 1 and Sanaz Mostaghim 2

Affiliations: 1 Faculty of Management Science and Engineering, Hochschule Karlsruhe, Moltkestrasse 30, Karlsruhe, Germany ; 2 Institute for Intelligent Cooperating Systems, Otto-von-Guericke Universität, Magdeburg, Germany

Keyword(s): Access Control, Role Mining, Real-world Data, Evolutionary Algorithm.

Abstract: To protect the security of IT systems of companies and organizations, Role Based Access Control is a widely used concept. The corresponding optimization problem, the Role Mining Problem, which consists of finding an optimum set of roles based on a given assignment of permissions to users was shown to be NP-complete and evolutionary algorithms have demonstrated to be a promising solution strategy. It is usually assumed that the assignment of permissions to users, used for role mining, reflects exactly the permissions needed by a user to perform the given tasks. However, considering enterprise resource planning systems (ERP) in real-world use cases, permission-to-user assignments are often outdated or, if at all, only partially available. In contrast, trace data, which records the behavior of users in ERP systems, is easily available. This paper describes and analyzes the different data types and sources provided by ERP systems. Furthermore, it is examined, if this data is suitable to create an initial permission-to-user assignment or to enhance the quality of a yet existing one. For this purpose, different trace-data-based methods are introduced. In the context of an industry-related research project, ERP data of two different companies is analyzed and used to evaluate the presented methods. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.26.179.41

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Anderer, S.; Sahin, A.; Scheuermann, B. and Mostaghim, S. (2022). On using Authorization Traces to Support Role Mining with Evolutionary Algorithms. In Proceedings of the 14th International Joint Conference on Computational Intelligence (IJCCI 2022) - ECTA; ISBN 978-989-758-611-8; ISSN 2184-3236, SciTePress, pages 121-132. DOI: 10.5220/0011539300003332

@conference{ecta22,
author={Simon Anderer. and Alpay Sahin. and Bernd Scheuermann. and Sanaz Mostaghim.},
title={On using Authorization Traces to Support Role Mining with Evolutionary Algorithms},
booktitle={Proceedings of the 14th International Joint Conference on Computational Intelligence (IJCCI 2022) - ECTA},
year={2022},
pages={121-132},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011539300003332},
isbn={978-989-758-611-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on Computational Intelligence (IJCCI 2022) - ECTA
TI - On using Authorization Traces to Support Role Mining with Evolutionary Algorithms
SN - 978-989-758-611-8
IS - 2184-3236
AU - Anderer, S.
AU - Sahin, A.
AU - Scheuermann, B.
AU - Mostaghim, S.
PY - 2022
SP - 121
EP - 132
DO - 10.5220/0011539300003332
PB - SciTePress