期刊文献+

角色工程中一种最小角色集的求解算法 被引量:1

Acquiring Minimal Role Set Algorithm in Role Engineering
下载PDF
导出
摘要 角色工程是基于角色访问控制(Role-Based Access Control,RBAC)中的一个重要研究方向,它主要研究角色的获取与优化。目前已有很多关于角色获取与优化的研究,但这些研究所提出的算法要么复杂度较高(NP完全的),要么不能保证优化的效果是最优的。因此,研究建立了一种新的最小角色集求解算法。该算法的时间复杂度是多项式的,而且可以保证优化效果是最优的。首先通过引入代数方法对数据进行预处理,使用极大线性无关组对角色集合进行化简;然后在分析了集合各个运算符特点的基础上,利用概念格模型建立等价类,并最终获得最小角色集。实验结果表明所提算法是有效的。 Role engineering,which focuses on role acquisition and optimization,is an important research area in rolebased access control(RBAC).Recently,there have been many researches on role acquisition and optimization.However,these researches either have high time-complexity(NP complete),or cannot guarantee the acquired results optimal.In this paper,we proposed a new algorithm to acquire the optimal(or minimal)role set.Our algorithm has polynomial time complexity,and guarantees to acquire the optimal result.We first pretreated the role set using an algebra measure,and maximum linear independent group was introduced to simplify the role set.And after analyzing the characteristic of every set operator,we built equivalence classes using concept lattice model,and finally attained the optimal role set.The experiment results show that our algorithm is effective.
作者 韩道军 HAN Dao-jun(Institute of Data and Knowledge Engineering, Henan University, Kaifeng 475004, Chin)
出处 《计算机科学》 CSCD 北大核心 2017年第8期115-123,共9页 Computer Science
基金 国家自然科学基金资助项目(61272545 61402149) 河南省科技攻关计划基金资助项目(142102210390) 河南省教育厅科技攻关计划基金资助项目(14A520026) 河南省博士后科研项目(2015036)资助
关键词 RBAC 角色工程 最小角色集 Role based access control Role engineering Minimal role set
  • 相关文献

参考文献3

二级参考文献27

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 3Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 4Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 5Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)
  • 6Yingwei Cui,Jennifer Widom,Janet L. Wiener.Tracing the lineage of view data in a warehousing environment[J].ACM Transactions on Database Systems (TODS).2000(2)
  • 7Vaidya J,Afluri V,Guo Q. The role mining problem:finding a minimal descriptive set of roles[A]. Proceedings of the 12th ACM symposium on Access control models and technologies [C] .New York:ACM,2007. 175- 184.
  • 8Vaidya J, Afluri V, Gun Q, et al. Edge-rmp: Minimizing admin- istrative assignments for role-based access control [J]. Journal of Computer Security, 2009,17 (2) 211 - 235.
  • 9Lu H, Vaidya J, Afluri V. Optimal boolean malrix decomposi- tion: Application to role engineering [ A ]. IEEE 24th Interna- tional Conference on Data Engineefing [C ]. Piscataway: 1EEE, 2008.297 - 306.
  • 10Ene A, Home W, Milosavljevic N, et al. Fast exact and heuris- tic methods for role minimization problems[ A]. Proceedings of the 13th ACM symposium on Access control models and tech- nologies[ C] .New York: ACM,2008.1- 10.

共引文献783

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部