Bi-objective Optimization in Role Mining

Jason Crampton,Eduard Eiben,Gregory Gutin,Daniel Karapetyan,Diptapriyo Majumdar
2024-03-25
Abstract:Role mining is a technique used to derive a role-based authorization policy from an existing policy. Given a set of users $U$, a set of permissions $P$ and a user-permission authorization relation $\mahtit{UPA}\subseteq U\times P$, a role mining algorithm seeks to compute a set of roles $R$, a user-role authorization relation $\mathit{UA}\subseteq U\times R$ and a permission-role authorization relation $\mathit{PA}\subseteq R\times P$, such that the composition of $\mathit{UA}$ and $\mathit{PA}$ is close (in some appropriate sense) to $\mathit{UPA}$.
Computational Complexity,Artificial Intelligence
What problem does this paper attempt to address?