Computer Science ›› 2018, Vol. 45 ›› Issue (12): 117-122.doi: 10.11896/j.issn.1002-137X.2018.12.018
• Information Security • Previous Articles Next Articles
ZHOU Chao1,2,3,4, REN Zhi-yu1,2,3, WU Wen-chao1,2,3
CLC Number:
[1]SANDHU R S,COYNE E J,FEINSTEINH L,et al.Role-based access control models[J].Computer,1996,29(2):38-47. [2]COYNE E J.Role engineering[C]∥Proceedings of the first ACM Workshop on Role-based access control.ACM,1996. [3]MITRA B,SURAL S,VAIDYA J,et al.A survey of role mining[J].ACM Computing Surveys (CSUR),2016,48(4):1-37. [4]SCHLEGELMILCH J,STEFFENS U.Role mining with ORCA[C]∥Proceedings of the tenth ACM symposium on Access control Models and Technologies.ACM,2005:168-176. [5]ZHANG D N,RAMAMOHANARAO K,EBRINGER T.Roleengineering using graph optimization[C]∥Proceedings of the 12th ACM Symposium on Access Control Models and Technologies.2007:139-144. [6]GUO Q,VAIDYA J,ATLURI V.The role hierarchy miningproblem:discovery of optimal role hierarchies[C]∥Computer Security Applications Conference.IEEE,2008:237-246. [7]SARMAH A K,HAZARIKA S M,SINHA S K.Formal concept analysis:current trends and directions[J].Artificial Intelligence Review,2015,44(1):47-86. [8]MOLLOY I,CHEN H,LI T,et al.Mining roles with multiple objectives[J].ACM Transactions on Information and System Security (TISSEC),2010,13(4):1-35. [9]SOBIESKI S,ZIELINSKI B.Modelling role hierarchy structure using the Formal Concept Analysis[J].Annales Umcs Informa-tica,2010,10(2):143-159. [10]KUMAR C.Designing role-based access control using formalconcept analysis[J].Security and Communication Networks,2013,6(3):373-383. [11]KUMAR C A,MOULISWARAN S C,LI J,et al.Role based access control design using triadic concept analysis[J].Journal of Central South University,2016,23(12):3183-3191. [12]ZHANG L,ZHANG H L,HAN D J,et al.Theory and Algorithm for Roles Minimization Problem in RBAC Based on Concept Lattice[J].Acta Electronica Sinica,2014,42(12):2371-2378.(in Chinese) 张磊,张宏莉,韩道军,等.基于概念格的 RBAC 模型中角色最小化问题的理论与算法[J].电子学报,2014,42(12):2371-2378. [13]GANTER B,WILLE R.Formal concept analysis:mathematical foundations[M].New York:Springer Science & Business Media,2012. [14]ZHI H L.Extended Model of Formal Concept Analysis Oriented for Heterogeneous Data Analysis[J].Acta Electronica Sinica,2013,41(12):2451-2455.(in Chinese) 智慧来.面向异构数据分析的形式概念分析扩展模型[J].电子学报,2013,41(12):2451-2455. [15]GODIN R,MINEAU G,MISSAOUI R,et al.Méthodes de classification conceptuelle basées sur les treillis de Galois et applications[J].Revued’Intelligence Artificielle,1995,9:105-137. [16]GANTER B.Two Basic Algorithms in Concept Analysis[C]∥International Conference on Formal Concept Analysis.Springer-Verlag,2010:312-340. |
[1] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[2] | WANG Zi-yin, LI Lei-jun, MI Ju-sheng, LI Mei-zheng, XIE Bin. Attribute Reduction of Variable Precision Fuzzy Rough Set Based on Misclassification Cost [J]. Computer Science, 2022, 49(4): 161-167. |
[3] | WANG Zhi-cheng, GAO Can, XING Jin-ming. Three-way Approximate Reduction Based on Positive Region [J]. Computer Science, 2022, 49(4): 168-173. |
[4] | YANG Xiao-yu, YIN Kang-ning, HOU Shao-qi, DU Wen-yi, YIN Guang-qiang. Person Re-identification Based on Feature Location and Fusion [J]. Computer Science, 2022, 49(3): 170-178. |
[5] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[6] | XIAO Kang, ZHOU Xia-bing, WANG Zhong-qing, DUAN Xiang-yu, ZHOU Guo-dong, ZHANG Min. Review Question Generation Based on Product Profile [J]. Computer Science, 2022, 49(2): 272-278. |
[7] | LI Yan, FAN Bin, GUO Jie, LIN Zi-yuan, ZHAO Zhao. Attribute Reduction Method Based on k-prototypes Clustering and Rough Sets [J]. Computer Science, 2021, 48(6A): 342-348. |
[8] | ZHU Run-ze, QIN Xiao-lin, LIU Jia-chen. Study on Why-not Problem in Skyline Query of Road Network Based on Query Object [J]. Computer Science, 2021, 48(6): 57-62. |
[9] | LIU Zhong-hui, ZHAO Qi, ZOU Lu, MIN Fan. Heuristic Construction of Triadic Concept and Its Application in Social Recommendation [J]. Computer Science, 2021, 48(6): 234-240. |
[10] | WU Jian-xin, ZHANG Zhi-hong. Collaborative Filtering Recommendation Algorithm Based on User Rating and Similarity of Explicit and Implicit Interest [J]. Computer Science, 2021, 48(5): 147-154. |
[11] | PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319. |
[12] | SHEN Xia-jiong, YANG Ji-yong, ZHANG Lei. Attribute Exploration Algorithm Based on Unrelated Attribute Set [J]. Computer Science, 2021, 48(4): 54-62. |
[13] | WEN Xin, YAN Xin-yi, CHEN Ze-hua. Minimal Optimistic Concept Generation Algorithm Based on Equivalent Relations [J]. Computer Science, 2021, 48(3): 163-167. |
[14] | XU Ying-kun, MA Fang-nan, YANG Xu-hua, YE Lei. Attribute Network Representation Learning Based on Global Attention [J]. Computer Science, 2021, 48(12): 188-194. |
[15] | XU Xin-li, XIAO Yun-yue, LONG Hai-xia, YANG Xu-hua, MAO Jian-fei. Attributed Network Embedding Based on Matrix Factorization and Community Detection [J]. Computer Science, 2021, 48(12): 204-211. |
|