Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Role-Based Access Integrity: Identifying Policy Deviations in Low-Resource IT Environments

Authors: Jurabekov, Stan;

Role-Based Access Integrity: Identifying Policy Deviations in Low-Resource IT Environments

Abstract

Role-Based Access Control (RBAC) defines structured authorization policies by associating permissions with roles rather than individual users. While RBAC enforces formal access constraints, it does not ensure that role usage remains behaviorally consistent over time. In low-resource IT environments, continuous monitoring of role integrity is often limited to log retention without analytical oversight. This work proposes a lightweight, role-aware deviation modeling framework designed to identify policy integrity drift using standard authentication and application logs. Instead of framing deviation as malicious activity, the approach conceptualizes divergence as measurable inconsistency between expected and observed role behavior. The framework models baseline activity across frequency, temporal, and structural dimensions and computes interpretable deviation scores without reliance on deep learning architectures or labeled attack datasets. Evaluation using controlled scenarios demonstrates that the proposed method detects meaningful role-based drift while maintaining computational efficiency and stable alert volume. The framework operates with linear complexity and minimal infrastructure requirements, making it suitable for deployment in resource-constrained environments. This study contributes a governance-oriented perspective to access control research by bridging formal policy design and operational behavior visibility

Keywords

statistical baseline modeling, behavioral deviation detection, policy integrity, log-based monitoring, behavioral deviation, low-resource IT environments, role consistency modeling, Role-Based Access Control (RBAC);, governance-oriented security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!