Role Mining in Business


Book Description

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) OCo a policy-neutral access control model that serves as a bridge between academia and industry OCo is probably the most suitable security model for commercial applications. Interestingly, role design determines RBAC''s cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems. Among role engineering approaches, searching through access control systems to find de facto roles embedded in existing permissions is attracting increasing interest. The focus falls on role mining, which is applied data mining techniques to automate OCo to the extent possible OCo the role design task. This book explores existing role mining algorithms and offers insights into the automated role design approaches proposed in the literature. Alongside theory, this book acts as a practical guide for using role mining tools when implementing RBAC. Besides a comprehensive survey of role mining techniques deeply rooted in academic research, this book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process. Among the pioneering works on role mining, this book blends business elements with data mining theory, and thus further extends the applications of role mining into business practice. This makes it a useful guide for all academics, IT and business professionals.




Methodology for Hybrid Role Development


Book Description

"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate international press lately. Surveys indicate that insiders like employees are one of the biggest threats to data security within organisations. As a result of improper account management users accumulate a number of excessive rights over time, resulting in the so called identity chaos. In the course of constantly growing IT infrastructures on the one hand, as well as the legislative regulations and law on the other hand, role-based Identity Management in particular has become a means of solving the identity chaos and meeting data security requirements. However, the central challenge organisations face in this context is how to construct a role catalogue for their Identity Management infrastructure. Some companies deal with this issue by applying predominantly manual procedures based on organisational and operational structures. These approaches are known as Role Engineering methodologies. Throughout the last few years, so-called Role Mining methodologies which use Data Mining techniques that cluster existing access rights of employees have evolved as alternative approaches. Recent findings show that a combination of Role Engineering and Role Mining is necessary to define a good collection of roles. This book gives insight into a hybrid tool-supported methodology for cleansing identity and account data and developing business roles for employees using Role Engineering and Role Mining techniques. Its main goals are to increase the overall user management data quality and support companies throughout a semi-automated process of defining roles. The methodology considers existing employee information and access privileges without neglecting organisational structures and business experts' knowledge about the organisation.




Trusted Systems


Book Description

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.




Handbook on Securing Cyber-Physical Critical Infrastructure


Book Description

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. - Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios - Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on - Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout




Evolutionary Computation in Combinatorial Optimization


Book Description

This book constitutes the refereed proceedings of the 22nd European Conference on Evolutionary Computation in Combinatorial Optimization, EvoCOP 2022, held as part of Evo*2022, in Madrid, Spain, during April 20-21, 2022, co-located with the Evo*2022 events: EvoMUSART, EvoApplications, and EuroGP. The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions. They present recent theoretical and experimental advances in combinatorial optimization, evolutionary algorithms, and related research fields.




Decision Science and Social Risk Management


Book Description

Economists, decision analysts, management scientists, and others have long argued that government should take a more scientific approach to decision making. Pointing to various theories for prescribing and rational izing choices, they have maintained that social goals could be achieved more effectively and at lower costs if government decisions were routinely subjected to analysis. Now, government policy makers are putting decision science to the test. Recent government actions encourage and in some cases require government decisions to be evaluated using formally defined principles 01' rationality. Will decision science pass tbis test? The answer depends on whether analysts can quickly and successfully translate their theories into practical approaches and whether these approaches promote the solution of the complex, highly uncertain, and politically sensitive problems that are of greatest concern to government decision makers. The future of decision science, perhaps even the nation's well-being, depends on the outcome. A major difficulty for the analysts who are being called upon by government to apply decision-aiding approaches is that decision science has not yet evolved a universally accepted methodology for analyzing social decisions involving risk. Numerous approaches have been proposed, including variations of cost-benefit analysis, decision analysis, and applied social welfare theory. Each of these, however, has its limitations and deficiencies and none has a proven track record for application to govern ment decisions involving risk. Cost-benefit approaches have been exten sively applied by the government, but most applications have been for decisions that were largely risk-free.




Security and Trust Management


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.




Advanced Data Mining and Applications


Book Description

The two-volume set LNAI 8346 and 8347 constitutes the thoroughly refereed proceedings of the 9th International Conference on Advanced Data Mining and Applications, ADMA 2013, held in Hangzhou, China, in December 2013. The 32 regular papers and 64 short papers presented in these two volumes were carefully reviewed and selected from 222 submissions. The papers included in these two volumes cover the following topics: opinion mining, behavior mining, data stream mining, sequential data mining, web mining, image mining, text mining, social network mining, classification, clustering, association rule mining, pattern mining, regression, predication, feature extraction, identification, privacy preservation, applications, and machine learning.




Web Technologies and Applications


Book Description

This book constitutes the refereed proceedings of the workshops held at the 16th Asia-Pacific Web Conference, APWeb 2014, in Changsha, China, in September 2014. The 34 full papers were carefully reviewed and selected from 59 submissions. This volume presents the papers that have been accepted for the following workshops: First International Workshop on Social Network Analysis, SNA 2014; First International Workshop on Network and Information Security, NIS 2014; First International Workshop on Internet of Things Search, IoTS 2014. The papers cover various issues in social network analysis, security and information retrieval against the heterogeneous big data.




International Law and Corporate Actors in Deep Seabed Mining


Book Description

The deep seabed beyond national jurisdiction (known as the Area) comprises almost three-quarters of the entire surface area of the oceans, and is home to an array of prized commodities including valuable metals and rare earth elements. In recent years, there has been a marked growth in deep seabed investment by private corporate actors, and an increasing impetus towards exploitation. This book addresses the unresolved legal challenges which this increasing corporate activity will raise over the coming years, including in relation to matters of common management, benefit-sharing, marine environmental protection, and investment protection. Acting under the United Nations Convention on the Law of the Sea (UNCLOS), the International Seabed Authority is responsible for regulating the Area for the benefit of humanity and granting mining contracts. A product of its history, the UNCLOS deep seabed regime is an unlikely hybrid of capitalist and communist values, embracing the role of private actors while enshrining principles of resource distribution. As technological advances begin to outstrip legal developments, this book assesses the tension between corporate commercial activity in the Area and the achievement of the common heritage.