- Gebundene Ausgabe: 296 Seiten
- Verlag: World Scientific Publishing Company (20. Februar 2012)
- Sprache: Englisch
- ISBN-10: 9814374008
- ISBN-13: 978-9814374002
- Größe und/oder Gewicht: 15,5 x 2 x 23,6 cm
- Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
- Amazon Bestseller-Rang: Nr. 784.151 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
- Komplettes Inhaltsverzeichnis ansehen
Role Mining in Business: Taming Role-Based Access Control Administration (Englisch) Gebundene Ausgabe – 20. Februar 2012
Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.
Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.
Wenn Sie dieses Produkt verkaufen, möchten Sie über Seller Support Updates vorschlagen?
With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) a policy-neutral access control model that serves as a bridge between academia and industry is probably the most suitable security model for commercial applications.
Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems.
Among role engineering approaches, searching through access control systems to find de facto roles embedded in existing permissions is attracting increasing interest. The focus falls on role mining, which is applied data mining techniques to automate to the extent possible the role design task.
This book explores existing role mining algorithms and offers insights into the automated role design approaches proposed in the literature. Alongside theory, this book acts as a practical guide for using role mining tools when implementing RBAC. Beside a comprehensive survey of role mining techniques deeply rooted in academic research, this book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.
Among the pioneering works on role mining, this book blends business elements with data mining theory, and thus further extends the applications of role mining into business practice. This makes it a useful guide for all academics, IT and business professionals.
Die hilfreichsten Kundenrezensionen auf Amazon.com
First part of the book, “Fundamentals”, provides a great overview of the topics covered in it and creates a context for the further discussion. It starts with an overview of access control models, continues with detailed description of Role-Based Access Control (RBAC) model and provides more details about existing role engineering methods. Chapter 5 of the first part of the book is especially important for the reading and understanding of the rest of the book as it lays down the fundamentals of the mathematical tools and methods used for modelling roles and their structures. Specifically authors describe two approaches to roles modelling and their hierarchical relationships: Matrix-Based approach and Graph-Based approach. They also provide a separate section about pseudo-roles whose identification and exploitation are important for the whole role mining process.
Second part of the book, “Pattern Identification in User’s Entitlements”, focuses on mining roles from the available users-to-permissions mapping data, identification of meaningful roles among them and minimizing the set of meaningful roles for the sake of manageability. This part of the book starts with an overview of clustering techniques based on the grouping of data into classes, or clusters, of objects based on the similarities among objects within the cluster and discrepancies among the objects in different clusters. Different methods and criteria of grouping objects into clusters are reviewed and evaluated. Separate chapter of the second part is devoted to the methods of minimizing the identified role sets and reducing them to the manageable role hierarchies, adequately representing existing access rules in the system. This is done using the cost-driven approach in role engineering and based on the optimization of the identified role-sets as well as elimination of roles which are found costly from the administration perspective.
In subsequent two parts of the book authors describe in further details two major tasks outlined in the previous part – measuring the business meaning of roles and reducing the role mining complexity. In order for RBAC to be efficient, identified roles must be well aligned with business tasks and in order to achieve that role engineering process includes the models of business activities, organizational structure and evaluation of two indices that measure the correlation of identified roles with business activity and organizational structure: activity-spread and organization-unit-spread. The “Visual Role Mining” chapter describes a new approach in visualizing the role mining process and results which significantly facilitates the design of meaningful roles both from business and IT perspective and, thus, is very important in practical application of role mining techniques to the real business problems.
Overall, it’s a great book for everyone interested in the state of the art theories in role engineering and their application to the design and development of corresponding industry products to serve business needs. Of course, this is not a source of practical information for those who need to fulfil immediate role engineering tasks in real business systems but rather a work that accumulates results of different research groups, contains an excellent list of publications and provides a basis for both theoretical research and applied work in this field.
Ähnliche Artikel finden