International Journal of Advanced Information and Communication Technology


A Efficient Role Mining –RBAM with Constraint Satisfaction Problem

B. Shuriya, S. Thenmozhi, RVS Technical Campus, Coimbatore, Tamilnadu, India.

DOI :01.0401/ijaict.2015.10.08

International Journal of Advanced Information and Communication Technology

Received On : November 21, 2018

Revised On : December 11, 2018

Accepted On : January 15, 2018

Published On : February 05, 2018

Volume 05, Issue 02

Pages : 803-806

Abstract


The main areas of research related to access control concern the identification of methodologies and models. With the ever-increasing number of users and IT systems, organizations have to manage large numbers users permissions in an efficient manner. Role-based access control is the most wide-spread access control model. Yet, companies still find it difficult to adopt RBAC because of the complexity of identifying a suitable set of roles. Roles must accurately reflect functions and responsibilities of users in the organization. When hundreds or thousands of users have individual access permissions, adopting the best approach to engineer roles saves time and money, and protects data and systems. Among all role engineering approaches, searching legacy access control systems to find de facto roles embedded in existing permissions is attracting an increasing interest. Data mining techniques can be used to automatically propose candidate roles, leading to a class of tools and methodologies referred to as role mining. The user role assignment is framed using RBAM algorithm with CSP Technique.

Keywords


RBAM, CSP, Role Mining.

Cite this article


B. Shuriya, S. Thenmozhi, “A Efficient Role Mining –RBAM with Constraint Satisfaction Problem” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp.807-813, February 05, 2018.

Copyright


© 2018 B. Shuriya, S. Thenmozhi. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.