Lu et al., 2014 - Google Patents
An optimization framework for role miningLu et al., 2014
View PDF- Document ID
- 16430246752832117813
- Author
- Lu H
- Vaidya J
- Atluri V
- Publication year
- Publication venue
- Journal of Computer Security
External Links
Snippet
Role Based Access Control (RBAC) is accepted as the de facto access control model for organizations of all sizes. However, engineering the right set of roles is crucial to enable the correct deployment of RBAC within an organization. Indeed, discovering an optimal and …
- 238000005065 mining 0 title abstract description 59
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lu et al. | An optimization framework for role mining | |
| Lu et al. | Constraint-aware role mining via extended boolean matrix decomposition | |
| Bravyi et al. | On complexity of the quantum Ising model | |
| Zhang et al. | Probabilistic matrix factorization with personalized differential privacy | |
| Vishwanathan et al. | Graph kernels | |
| Zhang et al. | Learning causal structures based on divide and conquer | |
| Deepajothi et al. | A comparative study of classification techniques on adult data set | |
| Nguyen et al. | Landscape of machine learning evolution: privacy-preserving federated learning frameworks and tools | |
| Yu et al. | Privacy-preserving cox regression for survival analysis | |
| Vaidya et al. | Edge-rmp: Minimizing administrative assignments for role-based access control | |
| Terziyan et al. | Deep Homeomorphic Data Encryption for Privacy Preserving Machine Learning | |
| Gunawan | Classification of privacy preserving data mining algorithms: a review | |
| Abolfathi et al. | A scalable role mining approach for large organizations | |
| Vaidya | Boolean matrix decomposition problem: Theory, variations and applications to data engineering | |
| Colantonio et al. | Mining stable roles in RBAC | |
| Yang et al. | A Bayesian framework for community detection integrating content and link | |
| Nethravathi et al. | Cbts: Correlation based transformation strategy for privacy preserving data mining | |
| Whalen et al. | Multiclass classification of distributed memory parallel computations | |
| Liu et al. | Clustering with relative constraints | |
| Colantonio et al. | Mining business-relevant RBAC states through decomposition | |
| Antulov-Fantulin et al. | Synthetic sequence generator for recommender systems–memory biased random walk on a sequence multilayer network | |
| Jiang et al. | Research on role mining algorithms in RBAC | |
| Abolfathi et al. | An accurate and scalable role mining algorithm based on graph embedding and unsupervised feature learning | |
| Xia et al. | Data deletion for linear regression with noisy sgd | |
| Shrivastava et al. | Analyses of algorithms and complexity for secure association rule mining of distributed level hierarchy in web |