350 rub
Journal Highly available systems №2 for 2011 г.
Article in number:
Genetic optimization of role-based access schemes
Authors:
I.B. Saenko, I.V. Kotenko
Abstract:
The paper proposes a new method of optimization of role-based access schemes based on genetic algorithms. To implement the genetic algorithms we propose a number of important innovations, such as the presence of three chromosomes in individuals, the representation of chromosome genes by complex objects, the separation of selection and mutation in stages, taking into account confidentiality and availability of data in the fitness function, and others. Test results showed that the developed genetic algorithms can be applied successfully to find optimal schemes of role-based access to information
Pages: 112-116
References
- Kuhlmann M., Shohat D. and Schimpf G. Role mining - revealing business roles for security administration using data mining technology. Proceedings of Eighth ACM symposium on Access control models and technologies. June 2003. P. 179-186.
- Zhang D., Ramamohanarao K. and Ebringer T. Role engineering using graph optimization. Proceedings of 12th ACM symposium on Access control models and technologies. 2007. P. 139-144.
- Frank M., Basin D. and Buhmann J.M. A class of probabilistic models for role engineering. Proceedings of 15th ACM conference on Computer and communications security. Oct. 2008. P.299-310.
- Vaidya J., Atluri V. and Warner J. RoleMiner: mining roles using subset enumeration. Proceedings of 13th ACM conference on Computer and communications security. Nov. 2006. P. 144-153.
- Roeckle H., Schimpf G. and Weidinger R. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. Proceedings of Fifth ACM workshop on Role-based access control. July 2000. P. 103-110.
- Гладков Л.А., Курейчик В.В., Курейчик В.М. Генетические алгоритмы / под ред. В.М. Курейчика. М.: ФИЗМАТЛИТ. 2010. 368 с.
- Hu N., Bradford P.G. and Liu J. Applying role based access control and genetic algorithms to insider threat detection. Proceedings of 44th ACM annual Southeast regional conference. 2006. P. 790-791.