Computer Science ›› 2018, Vol. 45 ›› Issue (12): 117-122.doi: 10.11896/j.issn.1002-137X.2018.12.018

• Information Security • Previous Articles     Next Articles

Semantic Roles Mining Algorithms Based on Formal Concept Analysis

ZHOU Chao1,2,3,4, REN Zhi-yu1,2,3, WU Wen-chao1,2,3   

  1. (Information Engineering University,Zhengzhou 450001,China)1
    (Henan Province Key Laboratory of Information Security,Zhengzhou 450001,China)2
    (State Key Laboratory of Mathematical Engineering & Advanced Computing,Zhengzhou 450001,China)3
    (Electronic Equipment Test Cneter,Luoyang,Henan 471003,China)4
  • Received:2017-11-22 Online:2018-12-15 Published:2019-02-25

Abstract: Role-based access control (RBAC) with the advantages of management and security has been widely used in various fields after more than 20 years of development.How to migrate a non-RBAC system with a variety of data into an RBAC system has become a significant problem.Role is a basic feature of RBAC,therefore,role mining is an important part of the implementation of RBAC system.In this paper,the user-permission concept lattice and user-attribute concept lattice were generated based on formal concept analysis.After the user-permission concept lattice was reversed,it was mapped to initial candidate role state,and the final role state was mined by reduction and pruning operations.And then,the most approximate expressions were defined to give semantic meanings to roles by analyzing the similarity between user-permission concept lattice and user-attribute concept lattice.The generated roles have two advantages,one is structural hierarchy,which effectively reduces the authorization burden of administrator,and the other one is semantic meanings,which can be associated with the concepts in real life,enhancing the interpretability of role.Finally,the expe-rimental results verify the correctness and effectiveness of the proposed algorithm.

Key words: Attribute, Concept lattice, Formal concept analysis, Role mining, Semantic meanings

CLC Number: 

  • TP309
[1]SANDHU R S,COYNE E J,FEINSTEINH L,et al.Role-based access control models[J].Computer,1996,29(2):38-47.
[2]COYNE E J.Role engineering[C]∥Proceedings of the first ACM Workshop on Role-based access control.ACM,1996.
[3]MITRA B,SURAL S,VAIDYA J,et al.A survey of role mining[J].ACM Computing Surveys (CSUR),2016,48(4):1-37.
[4]SCHLEGELMILCH J,STEFFENS U.Role mining with ORCA[C]∥Proceedings of the tenth ACM symposium on Access control Models and Technologies.ACM,2005:168-176.
[5]ZHANG D N,RAMAMOHANARAO K,EBRINGER T.Roleengineering using graph optimization[C]∥Proceedings of the 12th ACM Symposium on Access Control Models and Technologies.2007:139-144.
[6]GUO Q,VAIDYA J,ATLURI V.The role hierarchy miningproblem:discovery of optimal role hierarchies[C]∥Computer Security Applications Conference.IEEE,2008:237-246.
[7]SARMAH A K,HAZARIKA S M,SINHA S K.Formal concept analysis:current trends and directions[J].Artificial Intelligence Review,2015,44(1):47-86.
[8]MOLLOY I,CHEN H,LI T,et al.Mining roles with multiple objectives[J].ACM Transactions on Information and System Security (TISSEC),2010,13(4):1-35.
[9]SOBIESKI S,ZIELINSKI B.Modelling role hierarchy structure using the Formal Concept Analysis[J].Annales Umcs Informa-tica,2010,10(2):143-159.
[10]KUMAR C.Designing role-based access control using formalconcept analysis[J].Security and Communication Networks,2013,6(3):373-383.
[11]KUMAR C A,MOULISWARAN S C,LI J,et al.Role based access control design using triadic concept analysis[J].Journal of Central South University,2016,23(12):3183-3191.
[12]ZHANG L,ZHANG H L,HAN D J,et al.Theory and Algorithm for Roles Minimization Problem in RBAC Based on Concept Lattice[J].Acta Electronica Sinica,2014,42(12):2371-2378.(in Chinese)
张磊,张宏莉,韩道军,等.基于概念格的 RBAC 模型中角色最小化问题的理论与算法[J].电子学报,2014,42(12):2371-2378.
[13]GANTER B,WILLE R.Formal concept analysis:mathematical foundations[M].New York:Springer Science & Business Media,2012.
[14]ZHI H L.Extended Model of Formal Concept Analysis Oriented for Heterogeneous Data Analysis[J].Acta Electronica Sinica,2013,41(12):2451-2455.(in Chinese)
智慧来.面向异构数据分析的形式概念分析扩展模型[J].电子学报,2013,41(12):2451-2455.
[15]GODIN R,MINEAU G,MISSAOUI R,et al.Méthodes de classification conceptuelle basées sur les treillis de Galois et applications[J].Revued’Intelligence Artificielle,1995,9:105-137.
[16]GANTER B.Two Basic Algorithms in Concept Analysis[C]∥International Conference on Formal Concept Analysis.Springer-Verlag,2010:312-340.
[1] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[2] WANG Zi-yin, LI Lei-jun, MI Ju-sheng, LI Mei-zheng, XIE Bin. Attribute Reduction of Variable Precision Fuzzy Rough Set Based on Misclassification Cost [J]. Computer Science, 2022, 49(4): 161-167.
[3] WANG Zhi-cheng, GAO Can, XING Jin-ming. Three-way Approximate Reduction Based on Positive Region [J]. Computer Science, 2022, 49(4): 168-173.
[4] YANG Xiao-yu, YIN Kang-ning, HOU Shao-qi, DU Wen-yi, YIN Guang-qiang. Person Re-identification Based on Feature Location and Fusion [J]. Computer Science, 2022, 49(3): 170-178.
[5] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[6] XIAO Kang, ZHOU Xia-bing, WANG Zhong-qing, DUAN Xiang-yu, ZHOU Guo-dong, ZHANG Min. Review Question Generation Based on Product Profile [J]. Computer Science, 2022, 49(2): 272-278.
[7] LI Yan, FAN Bin, GUO Jie, LIN Zi-yuan, ZHAO Zhao. Attribute Reduction Method Based on k-prototypes Clustering and Rough Sets [J]. Computer Science, 2021, 48(6A): 342-348.
[8] ZHU Run-ze, QIN Xiao-lin, LIU Jia-chen. Study on Why-not Problem in Skyline Query of Road Network Based on Query Object [J]. Computer Science, 2021, 48(6): 57-62.
[9] LIU Zhong-hui, ZHAO Qi, ZOU Lu, MIN Fan. Heuristic Construction of Triadic Concept and Its Application in Social Recommendation [J]. Computer Science, 2021, 48(6): 234-240.
[10] WU Jian-xin, ZHANG Zhi-hong. Collaborative Filtering Recommendation Algorithm Based on User Rating and Similarity of Explicit and Implicit Interest [J]. Computer Science, 2021, 48(5): 147-154.
[11] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[12] SHEN Xia-jiong, YANG Ji-yong, ZHANG Lei. Attribute Exploration Algorithm Based on Unrelated Attribute Set [J]. Computer Science, 2021, 48(4): 54-62.
[13] WEN Xin, YAN Xin-yi, CHEN Ze-hua. Minimal Optimistic Concept Generation Algorithm Based on Equivalent Relations [J]. Computer Science, 2021, 48(3): 163-167.
[14] XU Ying-kun, MA Fang-nan, YANG Xu-hua, YE Lei. Attribute Network Representation Learning Based on Global Attention [J]. Computer Science, 2021, 48(12): 188-194.
[15] XU Xin-li, XIAO Yun-yue, LONG Hai-xia, YANG Xu-hua, MAO Jian-fei. Attributed Network Embedding Based on Matrix Factorization and Community Detection [J]. Computer Science, 2021, 48(12): 204-211.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!