
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde, "Visual Role Mining: A Picture Is Worth a Thousand Roles," IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 6, pp. 11201133, June, 2012.  
BibTex  x  
@article{ 10.1109/TKDE.2011.37, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, title = {Visual Role Mining: A Picture Is Worth a Thousand Roles}, journal ={IEEE Transactions on Knowledge and Data Engineering}, volume = {24}, number = {6}, issn = {10414347}, year = {2012}, pages = {11201133}, doi = {http://doi.ieeecomputersociety.org/10.1109/TKDE.2011.37}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Knowledge and Data Engineering TI  Visual Role Mining: A Picture Is Worth a Thousand Roles IS  6 SN  10414347 SP1120 EP1133 EPD  11201133 A1  Alessandro Colantonio, A1  Roberto Di Pietro, A1  Alberto Ocello, A1  Nino Vincenzo Verde, PY  2012 KW  Access controls KW  data and knowledge visualization KW  mining methods and algorithms. VL  24 JA  IEEE Transactions on Knowledge and Data Engineering ER   
[1] S. De Capitani Di Vimercati, S. Foresti, P. Samarati, and S. Jajodia, "Access Control Policies and Languages," Int'l J. Computational Science and Eng., vol. 3, no. 2, pp. 94102, 2007.
[2] D. Ferraiolo, R.S. Sandhu, S. Gavrila, R. Kuhn, and R. Chandramouli, "Proposed NIST Standard for RoleBased Access Control," ACM Trans. Information and System Security, vol. 4, pp. 224274, 2001.
[3] E.J. Coyne, "RoleEngineering," Proc. ACM Workshop RoleBased Access Control (RBAC '95), pp. 1516, 1995.
[4] I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo, "Evaluating Role Mining Algorithms," Proc. 14th ACM Symp. Access Control Models and Technologies (SACMAT '09), pp. 95104, 2009.
[5] A. Colantonio, R. Di Pietro, A. Ocello, and N.V. Verde, "A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems," Proc. 14th ACM Symp. Access Control Models and Technologies (SACMAT '09), pp. 8594, 2009.
[6] A. Colantonio, R. Di Pietro, and A. Ocello, "A Costdriven Approach to Role Engineering," Proc. ACM Symp. Applied Computing (SAC '08), pp. 21292136, 2008.
[7] M. Frank, A.P. Streich, D. Basin, and J.M. Buhmann, "A Probabilistic Approach to Hybrid Role Mining," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 101111, 2009.
[8] J. Vaidya, V. Atluri, and Q. Guo, "The Role Mining Problem: Finding a Minimal Descriptive Set of Roles," Proc. 12th ACM Symp. Access Control Models and Technologies (SACMAT '07), pp. 175184, 2007.
[9] A. Colantonio, R. Di Pietro, and A. Ocello, "Leveraging Lattices to Improve Role Mining," Proc. IFIP 23rd Int'l Information Security Conf., pp. 333347, 2008.
[10] J. Vaidya, V. Atluri, and J. Warner, "RoleMiner: Mining Roles Using Subset Enumeration," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 144153, 2006.
[11] R. Gupta, G. Fang, B. Field, M. Steinbach, and V. Kumar, "Quantitative Evaluation of Approximate Frequent Pattern Mining Algorithms," Proc. 14th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '08), pp. 301309, 2008.
[12] M. Frank, D. Basin, and J.M. Buhmann, "A Class of Probabilistic Models for Role Engineering," Proc. 15th ACM Conf. Computer and Comm. Security (CCS '08), pp. 299310, 2008.
[13] Q. Guo, J. Vaidya, and V. Atluri, "The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies," Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 237246, 2008.
[14] J.D. Fekete, J.J. Wijk, J.T. Stasko, and C. North, "The Value of Information Visualization," Information Visualization: HumanCentered Issues and Perspectives, pp. 118, 2008.
[15] D.A. Keim, G. Andrienko, J.D. Fekete, C. Görg, J. Kohlhammer, and G. Melançon, "Visual Analytics: Definition, Process, and Challenges," Information Visualization: HumanCentered Issues and Perspectives, vol. 4950, pp. 154175, 2008.
[16] M. Kuhlmann, D. Shohat, and G. Schimpf, "Role Mining—Revealing Business Roles for Security Administration Using Data Mining Technology," Proc. Eighth ACM Symp. Access Control Models and Technologies (SACMAT '03), pp. 179186, 2003.
[17] A. Colantonio, R. Di Pietro, A. Ocello, and N.V. Verde, "ABBA: Adaptive BiclusterBased Approach to Impute Missing Values in Binary Matrices," Proc. ACM Symp. Applied Computing (SAC '10), pp. 10271034, 2010.
[18] A. Colantonio, R. Di Pietro, A. Ocello, and N.V. Verde, "Taming Role Mining Complexity in RBAC," Computers Security, vol. 29, pp. 548564, 2010.
[19] F. Geerts, B. Goethals, and T. Mielikäinen, "Tiling Databases," Proc. Seventh Int'l Conf. Discovery Science (DS '04), pp. 278289, 2004.
[20] C. Chen, "Top 10 Unsolved Information Visualization Problems," IEEE Trans. Computer Graphics and Applications, vol. 25, no. 4, pp. 1216, July 2005.
[21] C.K.S. Leung and C.L. Carmichael, "FpViz: A Visualizer for Frequent Pattern Mining," Proc. ACM SIGKDD Workshop Visual Analytics and Knowledge Discovery (VAKD '09), pp. 3039, 2009.
[22] R. Santamaria, R. Theron, and L. Quintales, "BicOverlapper: A Tool for Bicluster Visualization," Bioinformatics, vol. 24, no. 9, pp. 12121213, 2008.
[23] R. Jin, Y. Xiang, D. Fuhry, and F.F. Dragan, "Overlapping Matrix Pattern Visualization: A Hypergraph Approach," Proc. IEEE Int'l Conf. Data Mining (ICDM '08), pp. 313322, 2008.
[24] A. Colantonio, R. Di Pietro, A. Ocello, and N.V. Verde, "A New Role Mining Framework to Elicit Business Roles and to Mitigate Enterprise Risk," Decision Support Systems, vol. 50, no. 4, pp. 715731, 2010.
[25] A. Colantonio, R. Di Pietro, A. Ocello, and N.V. Verde, "Mining BusinessRelevant RBAC States through Decomposition," Proc. Security and PrivacySilver Linings in the Cloud, pp. 1930, 2010.
[26] M.R. Garey, D.S. Johnson, and L. Stockmeyer, "Some Simplified NPcomplete Problems," Proc. Sixth Ann. ACM Symp. Theory of Computing (STOC '74), pp. 4763, 1974.
[27] F. Chierichetti, R. Kumar, S. Pandey, and S. Vassilvitskii, "Finding the Jaccard Median," Proc. 21st Ann. ACMSIAM Symp. Discrete Algorithms (SODA '10), pp. 293311, 2010.
[28] M.J. Zaki and C.J. Hsiao, "Efficient Algorithms for Mining Closed Itemsets and Their Lattice Structure," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 4, pp. 462478, Apr. 2005.
[29] W. Hoeffding, "Probability Inequalities for Sums of Bounded Random Variables," J. Am. Statistical Assoc., vol. 58, no. 301, pp. 1330, 1963.