ber of roles and the execution time become constant
after a certain value of the constraint which is 6 for
our datasets. The reason behind this is, at high val-
ues of TRAC, the scenario becomes equivalent to role
mining without any constraint enforcement. Also, the
number of roles and execution time increases as the
size of TUPA increases.
6 CONCLUSION AND FUTURE
WORK
In this paper, we have formally defined the problem of
mining a minimal set of temporal roles in presence of
a cardinality constraint which restricts the maximum
number of roles that each user can activate in a spe-
cific set of time intervals. We have shown this prob-
lem to be NP-complete and have proposed a heuristic
algorithm to solve it. The proposed approach works
in two phases, the first phase using an existing con-
strained role mining algorithm to mine the time inter-
val specific UPAs and the second phase merging the
temporal roles obtained from the first phase.
In future, we intend to design temporal role min-
ing methods capable of enforcing the various cardi-
nality constraints proposed for the GTRBAC model
either in isolation or in combination. Also, it will
be interesting to investigate how role mining metrics
other than the number of temporal roles can be min-
imized in presence of these constraints. Moreover,
the enforcement of cardinality constraints in presence
of an administrative temporal RBAC model can be a
possible future direction of research.
REFERENCES
Batra, G., Atluri, V., Vaidya, J., and Sural, S. (2021). In-
cremental maintenance of abac policies. In 11th ACM
Conference on Data and Application Security and Pri-
vacy, page 185 – 196.
Bertino, E., Bonatti, P. A., and Ferrari, E. (2001). TRBAC:
A Temporal Role-Based Access Control Model. ACM
Trans. on Info. and Sys. Security, 4(3):191–233.
Blundo, C. and Cimato, S. (2012). Constrained role mining.
In Proc. of 8th Int. Workshop on Security and Trust
Management, pages 289–304.
Blundo, C., Cimato, S., and Siniscalchi, L. (2020). Man-
aging constraints in role based access control. IEEE
Access, 8:140497–140511.
Carlo, B., Stelvio, C., and Luisa, S. (2018). Postprocess-
ing in constrained role mining. In Int. Conf. on In-
telligent Data Engineering and Automated Learning,
pages 204–214.
Das, S., Sural, S., Vaidya, J., Atluri, V., and Rigoll, G.
(2019). Vismap: Visual mining of attribute-based ac-
cess control policies. In Int. Conf. on Information Sys-
tems Security, pages 79–98.
Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber,
R., and Tarjan, R. E. (2008). Fast exact and heuristic
methods for role minimization problems. In Proc. of
13th ACM Symposium on Access Control Models and
Technologies, pages 1–10.
Gupta, E., Sural, S., Vaidya, J., and Atluri, V. (2021).
Attribute-based access control for nosql databases. In
11th ACM Conference on Data and Application Secu-
rity and Privacy, pages 317 – 319.
Harika, P., Nagajyothi, M., John, J. C., Sural, S., Vaidya, J.,
and Atluri, V. (2015). Meeting cardinality constraints
in role mining. IEEE Trans. on Dependable and Se-
cure Computing, 12(1):71–84.
Hingankar, M. and Sural, S. (2011). Towards role min-
ing with restricted user-role assignment. In Proc. of
2nd Int. Conf. on Wireless Communication, Vehicular
Technology, Information Theory and Aerospace Elec-
tronic Systems Technology, pages 1–5.
Hu, V. C., Kuhn, D. R., and Ferraiolo, D. F. (2015).
Attribute-Based Access Control. Computer (IEEE),
48(2):85–88.
John, J. C., Sural, S., Atluri, V., and Vaidya, J. (2012).
Role mining under role-usage cardinality constraint.
In Proc. of 27th Int. Info. Security and Privacy Conf.,
pages 150–161.
Joshi, J. B. D., Bertino, E., Latif, U., and Ghafoor, A.
(2005). A Generalized Temporal Role-Based Access
Control Model. IEEE Trans. on Knowledge and Data
Engg., 17(1):4–23.
Lu, H., Hong, Y., Yang, Y., Duan, L., and Badar, N. (2013).
Towards user-oriented RBAC model. In Proc. of 27th
Int. Conf. on Data and Applications Security and Pri-
vacy, pages 81–96.
Lu, H., Hong, Y., Yang, Y., Duan, L., and Badar, N. (2015).
Towards user-oriented RBAC model. J. of Comp. Se-
curity, 23(1):107–129.
Mitra, B., Sural, S., Atluri, V., and Vaidya, J. (2013). To-
ward mining of temporal roles. In Proc. of 27th Conf.
on Data and Applications Security and Privacy, pages
65–80.
Mitra, B., Sural, S., Atluri, V., and Vaidya, J. (2015).
The generalized temporal role mining problem. J. of
Comp. Security, 23(1):31–58.
Mitra, B., Sural, S., Vaidya, J., and Atluri, V. (2016). Min-
ing temporal roles using many-valued concepts. Com-
puters & Security, 60:79 – 94.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-Based Access Control Models.
IEEE Computer, 29(2):38–47.
Stoller, S. and Bui, T. (2017). Mining hierarchical tempo-
ral roles with multiple metrics. J. of Comp. Security,
26(1):121–142.
Xu, Z. and Stoller, S. (2015). Mining Attribute-Based Ac-
cess Control policies. IEEE Transactions on Depend-
able and Secure Computing, 12(5):533–545.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
646