@InProceedings{ frank.ea:on:2010, abstract = {There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem. In this paper, we provide a detailed analysis of the requirements for role mining, the existing definitions of role mining, and the methods used to assess role mining results.Given basic assumptions on how access-control configurations are generated, we propose a novel definition of the role mining problem that fulfills the requirements that real-world enterprises typically have. In this way, we recast role mining as a prediction problem.}, address = {New York, NY, USA}, author = {Mario Frank and Joachim M. Buhmann and David Basin}, booktitle = {SACMAT '10: Proceeding of the 15th ACM symposium on Access control models and technologies}, copyright = {ACM}, copyrighturl = {http://doi.acm.org/10.1145/1809842.1809851}, isbn = {978-1-4503-0049-0}, language = {USenglish}, month = {June}, pages = {35--44}, publisher = {ACM}, title = {On the Definition of Role Mining}, url = {http://www.mariofrank.net/paper/DefOfRoleMining_SACMAT2010.pdf} , year = 2010, user = {mafrank} }