B. Shuriya, S. Thenmozhi, RVS Technical Campus, Coimbatore, Tamilnadu, India.
DOI :01.0401/ijaict.2015.10.08
International Journal of Advanced Information and Communication Technology
Received On : November 21, 2018
Revised On : December 11, 2018
Accepted On : January 15, 2018
Published On : February 05, 2018
Volume 05, Issue 02
Pages : 803-806
Abstract
The main areas of research related to access control concern the identification of methodologies and models. With the ever-increasing number of users and IT systems, organizations have to manage large numbers users permissions in an efficient manner. Role-based access control is the most wide-spread access control model. Yet, companies still find it difficult to adopt RBAC because of the complexity of identifying a suitable set of roles. Roles must accurately reflect functions and responsibilities of users in the organization. When hundreds or thousands of users have individual access permissions, adopting the best approach to engineer roles saves time and money, and protects data and systems. Among all role engineering approaches, searching legacy access control systems to find de facto roles embedded in existing permissions is attracting an increasing interest. Data mining techniques can be used to automatically propose candidate roles, leading to a class of tools and methodologies referred to as role mining. The user role assignment is framed using RBAM algorithm with CSP Technique.
Keywords
RBAM, CSP, Role Mining.
Cite this article
B. Shuriya, S. Thenmozhi, “A Efficient Role Mining –RBAM with Constraint Satisfaction Problem” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp.807-813, February 05, 2018.
Copyright
© 2018 B. Shuriya, S. Thenmozhi. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.