期刊文献+

基于扩展布尔矩阵分解的角色挖掘优化方法

下载PDF
导出
摘要 现有使用布尔矩阵分解法挖掘的角色结果存在冗余、可解释性较差的情况。为优化角色结果,结合基本角色挖掘问题及扩展布尔矩阵分解问题的研究,将角色挖掘问题转化为扩展布尔矩阵分解问题,提出一种角色挖掘优化方法。该方法利用快速挖掘法与布尔矩阵分解法创建并优化候选角色集,并结合扩展布尔乘运算法则,运用"集合并"与"集合差"两种操作进一步优化候选角色集。应用实例结果表明,该方法挖掘的优化角色集可解释性更强、准确性更高。
作者 孙伟 宋俊辉
出处 《软件导刊》 2016年第10期20-22,共3页 Software Guide
基金 河南省高等学校重点科研项目(17A520054)
  • 相关文献

参考文献9

  • 1孙伟,李艳灵,周文勇.细粒度基于传递功能的约束委托模型[J].信阳师范学院学报(自然科学版),2013,26(3):442-445. 被引量:4
  • 2KUHLMANN M, SHOHAT D, SCHIMPF G. Role mining-revea- ling business roles for security administration using data mining technology[C]. Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. Como: ACM press, 2003 : 179- 186.
  • 3马晓普,李瑞轩,胡劲纬.访问控制中的角色工程[J].小型微型计算机系统,2013,34(6):1301-1306. 被引量:11
  • 4孙伟,鲁骏,李艳灵.一种面向用户的约束角色挖掘优化[J].信阳师范学院学报(自然科学版),2014,27(4):589-592. 被引量:5
  • 5MOLLOY I, IA NINGHU1, I.I TIANCHENG, et al. Evaluating role mining algorithms[C]. Proceedings of the 14th ACM Symposi- um on Access Control Models and Technologies. New York: ACM Press, 2009 : 95-104.
  • 6ZHANG DANA, RAMAMOHANARAO K, EBRINGER T. Role engineering using graph optimisation[C]. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. So- phia Antipolis: ACM Press, 2007 : 139 144.
  • 7ENE A, HORNE W, MILOSAVLJEVIC N, et al. Fast exact and heuristic methods for role minimization problems[C]. Proc. of the 13th ACM Symposium on Access Control Models and Technolo- gies. Estes Park ACM press, 2008 : 1-10.
  • 8VAIDYA J, ATLURI V, GUO QI. The role mining problem: find- ing a minimal description set of roles[C]. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. So- phia Antipolis: ACM Press, 2007 : 175-184.
  • 9LU HAI-BING, VAIDYA J, ATLURI V, et al. Extended boolean matrix decomposition [ C]. Proceedings of the 9th International Conference on Data Mining. Miami : IEEE press, 2009 : 317-326.

二级参考文献23

  • 1翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 2林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 3翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015. 被引量:34
  • 4Barka E, Sandhu R. Framework for role-based delegation models [ C ]//Proceedings of the I6th Annum Computer Security Applications Confer- ence. Washington D C : IEEE Computer Society,2000 : 168-176.
  • 5Zhang L H, Ahn G J, Chu B T. A rule-based framework for role-based delegation[ C]//Proceedings of the 6th ACM Symposium on Access Con- trol Models and Technologies. New York : ACM Press,2001 : 153-162.
  • 6Zhang X W, Oh S, Sandhu R. PBDM:A flexible delegation model in RBAC [ C 1//Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. New York:ACM Press,2003:149-157.
  • 7A hn G, Sandhu R. Role-based authorization constraints specification [J]. A CM Transactions on Information and Systems,2000,3 (4) :207-226.
  • 8Kuhlmann M, Shohat D, Schimpf G. Role mining-revealing business roles for security administration using data mining technology[ C ]//Proceed- ings of the 8th ACM Symposium on Access Control Models and Technologies. Como: ACM Press,2003 : 179-186.
  • 9Zhang D N, Rartlamohanarao K, Ebringer T. Role engineering using graph optimisation [ C ]//Proceedings of the 12th ACM Symposium on Ac- cess Control Models and Technologies. Sophia Antipolis:ACM Press,2007:139-144.
  • 10V aidya J, Atluri V, Guo Q. The role mining problem :finding a minimal description set of roles [ C ]//Proceedings of the 12th A CM Symposium on Access Control Models aml Technologies. Sophia Antipolis : ACM Press,2007 : 175-184.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部