An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration
- PDF / 1,224,190 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 48 Downloads / 162 Views
ORIGINAL RESEARCH
An interactive role learning and discovery model for multi‑department RBAC building based on attribute exploration Xiajiong Shen1 · Jiyong Yang1 · Lei Zhang1,2 · Geying Yang1 Received: 29 May 2020 / Accepted: 24 October 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract A number of privacy breaches have occurred in recent years, which has made people pay increased attention to the security of information systems. On the basis of this issue, role-based access control (RBAC) has been proposed and proven through practice to be able to effectively guarantee the security of user system data. But, in RBAC, role engineering is a complex process. To simplify the process, an auxiliary interactive question-and-answer (Q and A) algorithm was proposed based on attribute exploration (machines and humans learn knowledge interactively). the auxiliary interactive Q and A algorithm based on attribute exploration has some defects. It is not only unable to work with many people, but also has difficulty finding qualified Q and A experts in actual work. To address these problems, this paper proposes an attribute exploration-based Role discovery model. This model not only avoids the time-consuming process in role engineering, but also solves the problem of the auxiliary interactive Q and A based on attribute exploration being unable to support multi-person collaborative question–answering. Therefore, the model algorithm can be used for machine learning knowledge to assist people to solve the problem of cross-departmental role formulation. Keywords Formal concept analysis · Concept lattice · Attribute exploration · Role engineering · Machine learning
1 Introduction With the development of information systems, information sharing among people has become increasingly convenient. However, even though the explosive growth of information system provides people with convenient and fast access to information, it also poses information security problems. Qiu et al. reviews the literatures on information security of the internet of things in recent years, which shows that information security is particularly important in the internet of things (Qiu et al. 2020). The serious threat of increasingly fierce security attacks and information leaks. Such problems have a major impact on personal privacy and national security (Michel et al. 2019).
* Lei Zhang [email protected] 1
Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Kaifeng 475004, People’s Republic of China
Institute of Data and Knowledge Engineering, Henan University, Kaifeng 475004, People’s Republic of China
2
To ensure the security of information systems, many scholars have presented a variety of solutions. Access control (Sandhu et al. 1994) gradually developed into one of the basic principles of information security after the 1970s. To prevent the intrusion of illegal users or information damage or leakage caused by careless operation of legal users, access control allows users to access system resou
Data Loading...