scispace - formally typeset
V

Vijayalakshmi Atluri

Researcher at Rutgers University

Publications -  222
Citations -  5702

Vijayalakshmi Atluri is an academic researcher from Rutgers University. The author has contributed to research in topics: Access control & Role-based access control. The author has an hindex of 37, co-authored 217 publications receiving 5328 citations. Previous affiliations of Vijayalakshmi Atluri include George Mason University & National Science Foundation.

Papers
More filters
Journal ArticleDOI

Modeling and Analysis of Workflows Using Petri Nets

TL;DR: A Petri Net (PN) based framework that facilitates specification of workflow applications, serves as a powerful tool for modeling the system under study at a conceptual level, allows for a smooth transition from the conceptual level to a testbed implementation and enables the analysis, simulation and validation of the systemunder study before proceeding to implementation is presented.
Proceedings ArticleDOI

The role mining problem: finding a minimal descriptive set of roles

TL;DR: The role mining problem (RMP) is defined as the problem of discovering an optimal set of roles from existing user permissions, and its theoretical bounds are analyzed to show that RMP is an NP-complete problem.
Book ChapterDOI

An Authorization Model for Workflows

TL;DR: To make sure that authorized subjects gain access on the required objects only during the execution of the specific task, granting and revoking of privileges need to be synchronized with the progression of the workflow.
Proceedings ArticleDOI

RoleMiner: mining roles using subset enumeration

TL;DR: An unsupervised approach called RoleMiner that mines roles from existing user-permission assignments that is quite accurate and efficient and helps to automate role definition.
Proceedings ArticleDOI

Optimal Boolean Matrix Decomposition: Application to Role Engineering

TL;DR: This paper presents the binary matrix decomposition problem in a role engineering context, whose goal is to discover an optimal and correct set of roles from existing permissions, referred to as the role mining problem (RMP), and considers several variants of the above basic RMP.