期刊文献+

一种面向用户的约束角色挖掘优化 被引量:5

User-Oriented Optimization for Role Mining with Constraints
下载PDF
导出
摘要 现有自底向上的角色工程方法挖掘规模庞大,系统管理任务繁重,且挖掘结果未能反映系统功能的安全需求.为优化角色挖掘,从终端用户的角度出发,将角色挖掘问题转化为聚类问题,提出一种面向用户的约束角色挖掘优化.该方法利用用户聚类四元组及角色约束优化挖掘过程,以综合评价挖掘效果及系统的安全性,并在构造和真实数据集上进行测试与分析.实验结果表明,该方法能够减轻系统的管理负担,并能保证信息系统的安全性. Results of role mining in large-scale organizations could not reflect requirements of system security in existing approaches to bottom-up role engineering,and system administration tasks were very arduous. In order to opti-mize role mining,an optimization method was proposed from the end-user perspective,which converted the role mining into clustering problem. User-oriented roles constraints and four-tuples of clustering were utilized to optimize the mining process and evaluate the mining effect comprehensively. It was tested on several datasets,both synthetic and real. Exper-imental results showed that,the method not only reduces the burden of administration, but also ensures system security.
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2014年第4期589-592,618,共5页 Journal of Xinyang Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61202194) 河南省教育厅科学技术研究重点项目(13A520765) 河南省信息技术教育研究项目(ITE12192)
关键词 角色挖掘 角色优化 面向用户的角色约束 稀疏用户-角色关联 role mining role optimization user-oriented roles constraints sparse user-role associations
  • 相关文献

参考文献11

  • 1Kuhlmann M, Shohat D, Schimpf G. Role mining-revealing business roles for security administration using data mining technology[ C ]//Proceed- ings of the 8th ACM Symposium on Access Control Models and Technologies. Como: ACM Press,2003 : 179-186.
  • 2马晓普,李瑞轩,胡劲纬.访问控制中的角色工程[J].小型微型计算机系统,2013,34(6):1301-1306. 被引量:11
  • 3孙伟,李艳灵,周文勇.细粒度基于传递功能的约束委托模型[J].信阳师范学院学报(自然科学版),2013,26(3):442-445. 被引量:4
  • 4Zhang D N, Rartlamohanarao K, Ebringer T. Role engineering using graph optimisation [ C ]//Proceedings of the 12th ACM Symposium on Ac- cess Control Models and Technologies. Sophia Antipolis:ACM Press,2007:139-144.
  • 5V aidya J, Atluri V, Guo Q. The role mining problem :finding a minimal description set of roles [ C ]//Proceedings of the 12th A CM Symposium on Access Control Models aml Technologies. Sophia Antipolis : ACM Press,2007 : 175-184.
  • 6Molloy I, Chen H, Li T C, et al. Mining roles with semantic meanings [ C ]//Proceedings of the 13 th ACM Symposium on Access Control Models and Technologies. Estes Park: ACM Press ,2008:21-30.
  • 7Ma X P, Li R X, Lu Z D, et al. Mining constraints in role-based access control [ J ]. Mathematical and Computer Modelling,2012,55 ( 1 ) :87-96.
  • 8Kumar R, Sural S, Gupta A. Mining RBAC roles under cardinality constraint [ C ]//Proceedings of the 6th International Conference on Informa- tion Systems Security. Gandhinagar : Information Systems Security Press,2010 : 171-185.
  • 9Vaidya J, Atluri V, Warner J. RoleMiner : mining roles using subset enumeration [ C ]//Proceedings of the 13 th ACM Conference on Computer and Communications Security. Alexandria : ACM Press,2006 : 144-153.
  • 10Ene A, Home W, Milosavljevic N, et al. Fast exact and heuristic methods for role minimization problems [ C ]//Proceedings of the 13th ACM Symposium on Access Control Models and Technologies. Estes Park : ACM Press ,2008 : 1-10.

二级参考文献12

共引文献11

同被引文献21

  • 1Molloy I,Li Ning-hui,Li Tian-cheng,et a/.Evaluating role mining algorithms[C]//Proceedings of the 14th ACM Sympo- sium on Access Control Models and Technologies.New York: A CM Press,2009:95-104.
  • 2Vaidya J,Atluri V,Guo Qi.The role mining problem:finding a minimal description set of roles[C]//Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. Sophia Antipolis:ACM Press,2007:175-184.
  • 3Lu Hai-bing,Vaidya J,Atluri V.Optimal boolean matrix de- composition:application to role engineering[C]//Proceedings of the 24th International Conference on Data Engineering.Cancun: IEEE press, 2008:297-306.
  • 4Ene A,Horne W,Milosavljevic N,et a/.Fast exact and heuris- tic methods for role minimization problems[C]//Proc, of the 13th ACM Symposium on Access Control Models and Technol- ogies.Estes Park:ACM press,2008:1-10.
  • 5Zhang Dana,Ramamohanarao K,Ebringer T.Role engineering using graph optimisation[C]//Proc, of the 12th ACM Sympo- sium on Access Control Models and Technologies.Sophia Anti- polis:ACM Press,2007:139-144.
  • 6KUHLMANN M, SHOHAT D, SCHIMPF G. Role mining-revea- ling business roles for security administration using data mining technology[C]. Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. Como: ACM press, 2003 : 179- 186.
  • 7MOLLOY I, IA NINGHU1, I.I TIANCHENG, et al. Evaluating role mining algorithms[C]. Proceedings of the 14th ACM Symposi- um on Access Control Models and Technologies. New York: ACM Press, 2009 : 95-104.
  • 8ZHANG DANA, RAMAMOHANARAO K, EBRINGER T. Role engineering using graph optimisation[C]. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. So- phia Antipolis: ACM Press, 2007 : 139 144.
  • 9ENE A, HORNE W, MILOSAVLJEVIC N, et al. Fast exact and heuristic methods for role minimization problems[C]. Proc. of the 13th ACM Symposium on Access Control Models and Technolo- gies. Estes Park ACM press, 2008 : 1-10.
  • 10VAIDYA J, ATLURI V, GUO QI. The role mining problem: find- ing a minimal description set of roles[C]. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. So- phia Antipolis: ACM Press, 2007 : 175-184.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部