%0 Conference Proceedings %T Migrating from DAC to RBAC %+ Rutgers Business School %+ Indian Institute of Technology Kharagpur (IIT Kharagpur) %A Uzun, Emre %A Lorenzi, David %A Atluri, Vijayalakshmi %A Vaidya, Jaideep %A Sural, Shamik %Z Part 2: Access Control and Authorization %< avec comité de lecture %( Lecture Notes in Computer Science %B 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC) %C Fairfax, VA, United States %Y Pierangela Samarati %I Springer International Publishing %3 Data and Applications Security and Privacy XXIX %V LNCS-9149 %P 69-84 %8 2015-07-13 %D 2015 %R 10.1007/978-3-319-20810-7_5 %Z Computer Science [cs]Conference papers %X Role Based Access Control (RBAC) is one of the most popular means for enforcing access control. One of the main reasons for this is that it is perceived as the least expensive configuration with respect to security administration. In this paper, we demonstrate that security administration is not always cheaper under RBAC when compared to the traditional Discretionary Access Control (DAC). If RBAC proves to be beneficial, organizations may choose to migrate from DAC to RBAC. There have been many algorithms developed to generate RBAC configurations from DAC configuration. Although these algorithms provide an RBAC configuration, the quality of the generated RBAC configuration could vary among different algorithms and DAC configurations. In this paper, we propose a decision support framework, which provides a basis for comparison among different potential RBAC derivations from DAC to determine the most desirable outcome with respect to the cost of security administration. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01745820/document %2 https://inria.hal.science/hal-01745820/file/340025_1_En_5_Chapter.pdf %L hal-01745820 %U https://inria.hal.science/hal-01745820 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-9149