[go: up one dir, main page]

Lu et al., 2014 - Google Patents

An optimization framework for role mining

Lu et al., 2014

View PDF
Document ID
16430246752832117813
Author
Lu H
Vaidya J
Atluri V
Publication year
Publication venue
Journal of Computer Security

External Links

Snippet

Role Based Access Control (RBAC) is accepted as the de facto access control model for organizations of all sizes. However, engineering the right set of roles is crucial to enable the correct deployment of RBAC within an organization. Indeed, discovering an optimal and …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Lu et al. An optimization framework for role mining
Lu et al. Constraint-aware role mining via extended boolean matrix decomposition
Bravyi et al. On complexity of the quantum Ising model
Zhang et al. Probabilistic matrix factorization with personalized differential privacy
Vishwanathan et al. Graph kernels
Zhang et al. Learning causal structures based on divide and conquer
Deepajothi et al. A comparative study of classification techniques on adult data set
Nguyen et al. Landscape of machine learning evolution: privacy-preserving federated learning frameworks and tools
Yu et al. Privacy-preserving cox regression for survival analysis
Vaidya et al. Edge-rmp: Minimizing administrative assignments for role-based access control
Terziyan et al. Deep Homeomorphic Data Encryption for Privacy Preserving Machine Learning
Gunawan Classification of privacy preserving data mining algorithms: a review
Abolfathi et al. A scalable role mining approach for large organizations
Vaidya Boolean matrix decomposition problem: Theory, variations and applications to data engineering
Colantonio et al. Mining stable roles in RBAC
Yang et al. A Bayesian framework for community detection integrating content and link
Nethravathi et al. Cbts: Correlation based transformation strategy for privacy preserving data mining
Whalen et al. Multiclass classification of distributed memory parallel computations
Liu et al. Clustering with relative constraints
Colantonio et al. Mining business-relevant RBAC states through decomposition
Antulov-Fantulin et al. Synthetic sequence generator for recommender systems–memory biased random walk on a sequence multilayer network
Jiang et al. Research on role mining algorithms in RBAC
Abolfathi et al. An accurate and scalable role mining algorithm based on graph embedding and unsupervised feature learning
Xia et al. Data deletion for linear regression with noisy sgd
Shrivastava et al. Analyses of algorithms and complexity for secure association rule mining of distributed level hierarchy in web