Over-Fitting and Error Detection for Online Role Mining

Recent research has attempted to use role-based approaches to recommend mobile services to other members among the same group in a context dependent manner. However, the traditional role mining approaches originated from the domain of security control tend to be rigid and may not be able to capture human behaviors adequately. In particular, during the course of role mining process, these approaches easily result in over-fitting, i.e., too many roles with slightly different service consumption patterns are found. As a result, they fail to reveal the true common preferences within the user community. This paper proposes an online role mining algorithm with a residual term and an error term, that automatically group users according to their interests and habits without losing sight of their individual preferences and random errors. Moreover, to resolve the over-fitting problem, the authors relax the role definition in role mining mechanism by introducing quasi-roles based on the concept of quasi-bicliques. Most importantly, the new concept allows us to propose a monitoring framework to detect and correct over-fitting in online role mining such that recommendations can be made based on the latest and genuine common preferences. To the best of the authors' knowledge, this is a new area in service recommendation that is yet to be fully explored.

[1]  J. Orlin Contentment in graph theory: Covering graphs with cliques , 1977 .

[2]  Vijayalakshmi Atluri,et al.  Migrating to optimal RBAC with minimal perturbation , 2008, SACMAT '08.

[3]  Tianyong Hao,et al.  Context-Aware Service Recommendation for Moving Connected Devices , 2012, 2012 International Conference on Connected Vehicles and Expo (ICCVE).

[4]  Anand R. Tripathi,et al.  Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.

[5]  Enhong Chen,et al.  An effective approach for mining mobile user habits , 2010, CIKM.

[6]  Vijayalakshmi Atluri,et al.  The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.

[7]  Dana Ron,et al.  A New Conceptual Clustering Framework , 2004, Machine Learning.

[8]  Javier Cubo,et al.  Adaptive Web Services for Modular and Reusable Software Development: Tactics and Solutions , 2012 .

[9]  Aboul Ella Hassanien,et al.  Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations , 2010 .

[10]  B. Biddle Role Theory: Expectations, Identities, and Behaviors , 1979 .

[11]  Yunjun Gao,et al.  Direction-based surrounder queries for mobile recommendations , 2011, The VLDB Journal.

[12]  Miroslav Zivkovic,et al.  Revenue Optimization of Service Compositions Using Conditional Request Retries , 2013, ICWS.

[13]  Joachim M. Buhmann,et al.  On the definition of role mining , 2010, SACMAT '10.

[14]  Taghi M. Khoshgoftaar,et al.  A Survey of Collaborative Filtering Techniques , 2009, Adv. Artif. Intell..

[15]  Riichiro Mizoguchi,et al.  Organizing Role-concepts in Ontology Development Environment: Hozo , 2004 .

[16]  Annie Chen,et al.  Context-aware collaborative filtering system: predicting the user's preferences in ubiquitous computing , 2005, CHI Extended Abstracts.

[17]  Javier Cubo,et al.  Reusing Services through Context-Aware Discovery and Adaptation in Pervasive Systems , 2013 .

[18]  Nicola Guarino,et al.  Social Roles and their Descriptions , 2004, KR.

[19]  Keith Cheverst,et al.  Exploring Context-aware Information Push , 2002, Personal and Ubiquitous Computing.

[20]  Shoji Kurakake,et al.  Construction and Use of Role-Ontology for Task-Based Service Navigation System , 2006, International Semantic Web Conference.

[21]  Shamik Sural,et al.  Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..

[22]  Vijayalakshmi Atluri,et al.  Optimal Boolean Matrix Decomposition: Application to Role Engineering , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[23]  Jian Wang,et al.  Context-aware role mining for mobile service recommendation , 2012, SAC '12.

[24]  Guizhen Yang,et al.  The complexity of mining maximal frequent itemsets and maximal frequent patterns , 2004, KDD.

[25]  Joachim M. Buhmann,et al.  A probabilistic approach to hybrid role mining , 2009, CCS.

[26]  Wolfgang Wörndl,et al.  Context-Aware Recommender Systems in Mobile Scenarios , 2009, Int. J. Inf. Technol. Web Eng..

[27]  Boudewijn F. van Dongen,et al.  Process mining: a two-step approach to balance between underfitting and overfitting , 2008, Software & Systems Modeling.

[28]  Raymond K. Wong,et al.  A data model and semantics of objects with dynamic roles , 1997, Proceedings 13th International Conference on Data Engineering.

[29]  Ina Fourie E‐activity and Intelligent Web Construction: Effects of Social Design , 2012 .

[30]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[31]  Robert E. Tarjan,et al.  Fast exact and heuristic methods for role minimization problems , 2008, SACMAT '08.

[32]  A. Nobel,et al.  On the size and recovery of submatrices of ones in a random binary matrix , 2008 .

[33]  Jinyan Li,et al.  Mining Maximal Quasi-Bicliques to Co-Cluster Stocks and Financial Ratios for Value Investment , 2006, Sixth International Conference on Data Mining (ICDM'06).

[34]  Sandra Sudarsky,et al.  Massive Quasi-Clique Detection , 2002, LATIN.

[35]  Francesco Ricci,et al.  Context-Aware Recommender Systems , 2011, AI Mag..