期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Role-Based Network Embedding via Quantum Walk with Weighted Features Fusion
1
作者 Mingqiang Zhou Mengjiao Li +1 位作者 Zhiyuan Qian Kunpeng Li 《Computers, Materials & Continua》 SCIE EI 2023年第8期2443-2460,共18页
Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networ... Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networks with similar structural patterns and functions.However,the rolesimilar nodes may be far away or even disconnected from each other.Meanwhile,the neighborhood node features and noise also affect the result of the role-based network embedding,which are also challenges of current network embedding work.In this paper,we propose a Role-based network Embedding via Quantum walk with weighted Features fusion(REQF),which simultaneously considers the influence of global and local role information,node features,and noise.Firstly,we capture the global role information of nodes via quantum walk based on its superposition property which emphasizes the local role information via biased quantum walk.Secondly,we utilize the quantum walkweighted characteristic function to extract and fuse features of nodes and their neighborhood by different distributions which contain role information implicitly.Finally,we leverage the Variational Auto-Encoder(VAE)to reduce the effect of noise.We conduct extensive experiments on seven real-world datasets,and the results show that REQF is more effective at capturing role information in the network,which outperforms the best baseline by up to 14.6% in role classification,and 23% in role detection on average. 展开更多
关键词 role-based network embedding quantum walk quantum walk weighted characteristic function complex networks
下载PDF
校园网中的Role-based Access Control模型设计 被引量:2
2
作者 王新月 《计算机与现代化》 2004年第3期54-57,共4页
介绍了如何将Role basedAccessControl(RBAC)模型应用于校园网的访问控制系统中。其特点是通过分配和取消角色来完成用户权限的授予和取消 ,并且提供了角色分配规则和操作检查规则。安全管理人员根据需要定义各种角色 ,并设置合适的访... 介绍了如何将Role basedAccessControl(RBAC)模型应用于校园网的访问控制系统中。其特点是通过分配和取消角色来完成用户权限的授予和取消 ,并且提供了角色分配规则和操作检查规则。安全管理人员根据需要定义各种角色 ,并设置合适的访问权限 ,而用户根据其责任和资历被指派为不同的角色。根据系统的实际需求 。 展开更多
关键词 校园网 role-based ACCESS Control模型 设计 访问控制系统 角色分配规则
下载PDF
A General Attribute and Rule Based Role-Based Access Control Model
3
作者 朱一群 李建华 张全海 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第6期719-724,共6页
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio... Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments. 展开更多
关键词 ATTRIBUTE RULE user-role ASSIGNMENT role-based ACCESS control(RBAC) ACCESS policy
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
4
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI (privilege management infrastructure)
下载PDF
Provably Secure Role-Based Encryption with Revocation Mechanism
5
作者 朱岩 胡宏新 +2 位作者 Gail-Joon Ahn 王怀习 王善标 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期697-710,共14页
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ... Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys. 展开更多
关键词 CRYPTOGRAPHY role-based encryption role hierarchy key hierarchy collusion security REVOCATION
原文传递
Fuzzy Logic Inference System for Managing Intensive Care Unit Resources Based on Knowledge Graph
6
作者 Ahmad F Subahi Areej Athama 《Computers, Materials & Continua》 SCIE EI 2023年第12期3801-3816,共16页
With the rapid growth in the availability of digital health-related data,there is a great demand for the utilization of intelligent information systems within the healthcare sector.These systems can manage and manipul... With the rapid growth in the availability of digital health-related data,there is a great demand for the utilization of intelligent information systems within the healthcare sector.These systems can manage and manipulate this massive amount of health-related data and encourage different decision-making tasks.They can also provide various sustainable health services such as medical error reduction,diagnosis acceleration,and clinical services quality improvement.The intensive care unit(ICU)is one of the most important hospital units.However,there are limited rooms and resources in most hospitals.During times of seasonal diseases and pandemics,ICUs face high admission demand.In line with this increasing number of admissions,determining health risk levels has become an essential and imperative task.It creates a heightened demand for the implementation of an expert decision support system,enabling doctors to accurately and swiftly determine the risk level of patients.Therefore,this study proposes a fuzzy logic inference system built on domain-specific knowledge graphs,as a proof-of-concept,for tackling this healthcare-related issue.The system employs a combination of two sets of fuzzy input parameters to classify health risk levels of new admissions to hospitals.The proposed system implemented utilizes MATLAB Fuzzy Logic Toolbox via several experiments showing the validity of the proposed system. 展开更多
关键词 Fuzzy logic role-based expert system decision-support system knowledge graph Internet of Things ICU resource management Neo4J graph database
下载PDF
基于角色的动态分级权限控制模型 被引量:1
7
作者 易可可 郑敏 +1 位作者 钱向东 顾真彦 《宝钢技术》 CAS 2009年第1期19-22,共4页
企业级WEB ERP应用系统中,对于业务管理层级分明、用户多而分散、权限难以集中管理的系统,传统的RBAC(Role-based Access Control)模型难以满足实际业务系统的需求。基于RBAC模型的基本思想,对角色概念进行了扩展和增强,提出了一种通过... 企业级WEB ERP应用系统中,对于业务管理层级分明、用户多而分散、权限难以集中管理的系统,传统的RBAC(Role-based Access Control)模型难以满足实际业务系统的需求。基于RBAC模型的基本思想,对角色概念进行了扩展和增强,提出了一种通过资源和角色的分级分层定义,权限分布式逐级控制模型,优化企业管理流程。在实现技术上,定义了人力资源管理区树结构,更加直观地体现了层次结构,简化了授权配置。 展开更多
关键词 role-based ACCESS Control(RBAC) 分级权限管理 B/S模式 访问控制
下载PDF
一种基于RT^(AT)的模糊分布式证书链发现算法
8
作者 王海艳 陈敬雷 王汝传 《微电子学与计算机》 CSCD 北大核心 2009年第10期8-11,共4页
对RT(Role-based Trust-management)语言扩展得出一种新的RTAT语言,并在此基础上设计出一种模糊分布式证书链发现算法,解决了持证节点异常离线导致的证书链断裂和节点之间信任关系动态变化的问题.
关键词 RT(role-based Trust-management) 权威推荐度 第三方信任度
下载PDF
General Attribute Based RBAC Model for Web Services 被引量:3
9
作者 ZHU Yiqun LI Jianhua ZHANG Quanhai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第1期81-86,共6页
Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships o... Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes based on access policies for Web services, and proposes a general attribute based role-based access control(GARBAC) model. The model introduces the notions of single attribute expression, composite attribute expression, and composition permission, defines a set of elements and relations among its elements and makes a set of rules, assigns roles to user by inputing user's attributes values. The model is a general access control model, can support more granularity resource information and rich access control policies, also can be used to wider application for services. The paper also describes how to use the GARBAC model in Web services environments. 展开更多
关键词 ATTRIBUTE RULE user-role assignment role-based access control (RBAC) access policy
下载PDF
Fuzzy Logic-Based Health Monitoring System for COVID’19 Patients 被引量:3
10
作者 M.Jayalakshmi Lalit Garg +4 位作者 K.Maharajan K.Jayakumar Kathiravan Srinivasan Ali Kashif Bashir K.Ramesh 《Computers, Materials & Continua》 SCIE EI 2021年第5期2431-2447,共17页
In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVI... In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVID-19 pandemic situation to help mitigate such problems by encouraging healthcare to transition from hospital-centred services to self-care,mobile care and home care.In this aspect,we propose a pervasive system to monitor the COVID’19 patient’s conditions within the hospital and outside by monitoring their medical and psychological situation.It facilitates better healthcare assistance,especially for COVID’19 patients and quarantined people.It identies the patient’s medical and psychological condition based on the current context and activities using a fuzzy context-aware reasoning engine based model.Fuzzy reasoning engine makes decisions using linguistic rules based on inference mechanisms that support the patient condition identication.Linguistics rules are framed based on the fuzzy set attributes belong to different context types.The fuzzy semantic rules are used to identify the relationship among the attributes,and the reasoning engine is used to ensure precise real-time context interpretation and current evaluation of the situation.Outcomes are measured using a fuzzy logic-based context reasoning system under simulation.The results indicate the usefulness of monitoring the COVID’19 patients based on the current context. 展开更多
关键词 Pervasive healthcare COVID’19 CONTEXT-AWARE fuzzy reasoning engine fuzzy logic role-based expert system
下载PDF
Least Privileges and Role’s Inheritance of RBAC 被引量:3
11
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
下载PDF
Design of Secure Distributed Intrusion Detection Systems 被引量:5
12
作者 GUO Dai fei, YANG Yi xian, HU Zheng ming (Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第2期17-24,共8页
Intrusion Detection System(IDS)have received a great deal ofattention because of their excellent ability of preventing networkincidents. Recently, many efficient approaches have been proposed toimprove detection abili... Intrusion Detection System(IDS)have received a great deal ofattention because of their excellent ability of preventing networkincidents. Recently, many efficient approaches have been proposed toimprove detection ability of IDS. While the self-protection abilityof IDS is relatively worse and easy to be exploited by attackers,this paper gives a scheme of Securely Distributed Intrusion DetectionSystem(SDIDS). This system adopts special measurements to enforce thesecurity of IDS components. A new secure mechanism combiningrole-based access control and attribute certificate is used to resistattack to communication. 展开更多
关键词 SDIDS attribute certificate role-based access control CIDF
原文传递
Organization-based agent-oriented programming: model, mechanisms, and language
13
作者 Cuiyun HU Xinjun MAO +1 位作者 Mengjun LI Zhi ZHU 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第1期33-51,共19页
An increasing number of social computational systems consist of a great amount of autonomous entities and operate in highly dynamic and unpredictable environments. To construct such systems needs to seek high-level ab... An increasing number of social computational systems consist of a great amount of autonomous entities and operate in highly dynamic and unpredictable environments. To construct such systems needs to seek high-level abstrac- tion to manage the complexity of the systems and novel mechanism to support their characteristics, i.e., dynamism and flexibility. Agent-oriented programming (AOP) is con- sidered as a potential paradigm for developing such systems by exhibiting a number of characteristics, such as autonomy, flexibility, social ability, etc. However, current researches on AOP mainly focus on the construction of multi-agent system (MAS) with theory and language facilities inspired from arti- ficial intelligence (AI) and distributed AI, seldom considering and integrating the proven principles and practices of pro- gramming and software engineering. Moreover, abstractions and mechanism based on AI are inadequate for developing dynamic and flexible MAS in open environment. This paper proposes a novel AOP approach, namely Oragent, for con- structing and implementing dynamic and flexible systems. From a software engineering perspective, Oragent integrates organizational concepts and mechanism into AOP language, and support the dynamism and flexibility with explicit prim- itives. The proposed approach consists of a programming model and a corresponding programming language. This paper presents the syntax and formal operational semanticsof Oragent language, and studies a case to demonstrate our approach. 展开更多
关键词 agent agent-oriented programming organiza-tion-based programming role enactment role-based interac-tions organization abstraction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部