Toward edge minability for role mining in bipartite networks

作者: Lijun Dong , Yi Wang , Ran Liu , Benjie Pi , Liuyi Wu

DOI: 10.1016/J.PHYSA.2016.06.068

关键词:

摘要: Abstract Bipartite network models have been extensively used in information security to automatically generate role-based access control (RBAC) from dataset. This process is called role mining . However, not all the topologies of bipartite networks are suitable for mining; some edges may even reduce quality mining. causes unnecessary time consumption as NP-hard. Therefore, promote results, capability that an edge composes roles with other edges, minability , needs be identified. We tackle problem angle importance complex networks; easily covered by considered more important. Based on this idea, k -shell decomposition extended reveal different edges. By way, a can quickly purified excluding low-minability mining, and thus effectively improved. Extensive experiments via real-world datasets conducted confirm above claims.

参考文章(27)
Fang Liang, Guo Yunchuan, A Survey of Role Mining Methods in Role-Based Access Control System Web Technologies and Applications. pp. 291- 300 ,(2014) , 10.1007/978-3-319-11119-3_27
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, None, An optimization framework for role mining Journal of Computer Security. ,vol. 22, pp. 1- 31 ,(2014) , 10.3233/JCS-130484
Ajay Sridharan, Yong Gao, Kui Wu, James Nastos, Statistical behavior of embeddedness and communities of overlapping cliques in online social networks international conference on computer communications. pp. 546- 550 ,(2011) , 10.1109/INFCOM.2011.5935223
Linyuan Lü, Liming Pan, Tao Zhou, Yi-Cheng Zhang, H. Eugene Stanley, Toward link predictability of complex networks Proceedings of the National Academy of Sciences of the United States of America. ,vol. 112, pp. 2325- 2330 ,(2015) , 10.1073/PNAS.1424644112
He Huang, Zhijun Yan, Yaohui Pan, Measuring edge importance to improve immunization performance Physica A-statistical Mechanics and Its Applications. ,vol. 416, pp. 532- 540 ,(2014) , 10.1016/J.PHYSA.2014.09.007
Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens, Role Mining to Assist Authorization Governance International Journal of Secure Software Engineering. ,vol. 3, pp. 45- 64 ,(2012) , 10.4018/JSSE.2012100103
Ping Hu, Wenli Fan, Shengwei Mei, Identifying node importance in complex networks Physica A-statistical Mechanics and Its Applications. ,vol. 429, pp. 169- 176 ,(2015) , 10.1016/J.PHYSA.2015.02.002
R.S. Sandhu, P. Samarati, Access control: principle and practice IEEE Communications Magazine. ,vol. 32, pp. 40- 48 ,(1994) , 10.1109/35.312842
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens, Mining roles with noisy data Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT '10. pp. 45- 54 ,(2010) , 10.1145/1809842.1809852