Skip to Main Content (Press Enter)

Logo UNIMI
  • ×
  • Home
  • Persone
  • Attività
  • Ambiti
  • Strutture
  • Pubblicazioni
  • Terza Missione

Expertise & Skills
Logo UNIMI

|

Expertise & Skills

unimi.it
  • ×
  • Home
  • Persone
  • Attività
  • Ambiti
  • Strutture
  • Pubblicazioni
  • Terza Missione
  1. Pubblicazioni

A bag of words model for efficient discovery of roles in access control systems

Articolo
Data di Pubblicazione:
2026
Citazione:
A bag of words model for efficient discovery of roles in access control systems / C. Blundo, S. Cimato. - In: COMPUTERS & SECURITY. - ISSN 0167-4048. - 162:(2026 Mar), pp. 104808.1-104808.19. [10.1016/j.cose.2025.104808]
Abstract:
The popularity of the Role-based Access Control (RBAC) model is determined by its flexibility and its adaptability in different contexts, easing the enforcement and the management of security policy. In some cases, different kinds of (cardinality) constraints are considered to adjust and adapt roles and their assignment to best represent the organization's security policy. However, the process of role mining, whether based on an organizational scenario or on existing permission assignments, is a hard task, since the problem shows NP-hard computational complexity and in case of frequent policy updates, the dynamic adaptation of the roles can be challenging. Then, the only possibility of producing an RBAC model compliant with the security policy is to resort to heuristics, which may return an approximation of the optimal solution. In this paper, we propose an innovative approach to explore the space of the solution based on the bag of word value, which is commonly deployed in the field of document representation and knowledge extraction. We propose different heuristics and validate our approach reporting the results of the application to standard datasets, and providing an evaluation under different metrics and indicators. We show that our technique returns improved results and provides an alternative way to produce valid solutions for constrained RBAC.
Tipologia IRIS:
01 - Articolo su periodico
Keywords:
Constrained role mining; RBAC; Role mining
Elenco autori:
C. Blundo, S. Cimato
Autori di Ateneo:
CIMATO STELVIO ( autore )
Link alla scheda completa:
https://air.unimi.it/handle/2434/1211037
Link al Full Text:
https://air.unimi.it/retrieve/handle/2434/1211037/3234555/1-s2.0-S0167404825004973-main.pdf
Progetto:
SEcurity and RIghts in the CyberSpace (SERICS)
  • Aree Di Ricerca

Aree Di Ricerca

Settori


Settore INFO-01/A - Informatica
  • Informazioni
  • Assistenza
  • Accessibilità
  • Privacy
  • Utilizzo dei cookie
  • Note legali

Realizzato con VIVO | Progettato da Cineca | 26.1.3.0