Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th...Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.展开更多
The authors prove that the crossed product of an infinite dimensional simple separable unital C*-algebra with stable rank one by an action of a finite group with the tracial Rokhlin property has again stable rank one....The authors prove that the crossed product of an infinite dimensional simple separable unital C*-algebra with stable rank one by an action of a finite group with the tracial Rokhlin property has again stable rank one. It is also proved that the crossed product of an infinite dimensional simple separable unital C*-algebra with real rank zero by an action of a finite group with the tracial Rokhlin property has again real rank zero.展开更多
基金Project(61003140) supported by the National Natural Science Foundation of ChinaProject(013/2010/A) supported by Macao Science and Technology Development FundProject(10YJC630236) supported by Social Science Foundation for the Youth Scholars of Ministry of Education of China
文摘Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.
基金Project supported by the National Natural Science Foundation of China (No. 10771161)
文摘The authors prove that the crossed product of an infinite dimensional simple separable unital C*-algebra with stable rank one by an action of a finite group with the tracial Rokhlin property has again stable rank one. It is also proved that the crossed product of an infinite dimensional simple separable unital C*-algebra with real rank zero by an action of a finite group with the tracial Rokhlin property has again real rank zero.