Back to Search Start Over

Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)

Authors :
Vishnu Kamisetty
Pawankumar Yedugani
Ravi Mukkamala
Source :
Information Systems Security ISBN: 9783642107719, ICISS
Publication Year :
2009
Publisher :
Springer Berlin Heidelberg, 2009.

Abstract

In Role Based Access Control (RBAC) systems, formulating a correct set of roles, assigning appropriate privileges to roles, and assigning roles to users are the fundamental design tasks. Whether these tasks are performed by a human (e.g., system administrator) or by a machine (e.g., expert system), misconfigurations are likely to occur. The misconfigurations could manifest as under-privileges (fewer privileges assigned) or over-privileges (more privileges than necessary). In this paper, we describe an approach based on role mining to detect and correct such misconfigurations. Here, the overlap among the users and privileges of different roles is used to identify possible misconfigurations.

Details

ISBN :
978-3-642-10771-9
ISBNs :
9783642107719
Database :
OpenAIRE
Journal :
Information Systems Security ISBN: 9783642107719, ICISS
Accession number :
edsair.doi...........62b5a28e70b9fa7ddbb62717fbc95065