Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/10910
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Roy, Arindam | - |
dc.date.accessioned | 2023-05-18T05:24:04Z | - |
dc.date.available | 2023-05-18T05:24:04Z | - |
dc.date.issued | 2016-12 | - |
dc.identifier.uri | https://dl.acm.org/doi/abs/10.1145/2996470 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/10910 | - |
dc.description.abstract | Since any organizational environment is typically resource constrained, especially in terms of human capital, organization managers would like to maximize the utilization of available human resources. However, tasks cannot simply be assigned to arbitrary employees since the employee needs to have the necessary capabilities for executing a task. Furthermore, security policies constrain the assignment of tasks to employees, especially given the other tasks assigned to the same employee. Since role-based access control (RBAC) is the most commonly used access control model for commercial information systems, we limit our attention to consider constraints in RBAC. In this article, we define the Employee Assignment Problem (EAP), which aims to identify an employee to role assignment such that it permits the maximal flexibility in assigning tasks to employees while ensuring that the required security constraints are met. We prove that finding an optimal solution is NP-complete and therefore provide a greedy solution. Experimental evaluation of the proposed approach shows that it is both efficient and effective. | en_US |
dc.language.iso | en | en_US |
dc.publisher | ACM Digital Library | en_US |
dc.subject | Management | en_US |
dc.subject | Control systems | en_US |
dc.subject | Employee Assignment | en_US |
dc.title | On Optimal Employee Assignment in Constrained Role-Based Access Control Systems | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Management |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.