Role mining optimization modeling method meeting user role-usage cardinality constraint
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A modeling method and role technology, applied in data processing applications, special data processing applications, instruments, etc., can solve problems such as the lack of a unified standard for role sets, and achieve the effect of simplifying construction, concise mining results, and reducing mining costs.
Pending Publication Date: 2018-08-14
XINYANG NORMAL UNIVERSITY
View PDF1 Cites 2 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Potential problems of this method in the process of mining roles: lack of uniform standards for evaluating the quality of character sets
However, little research has been done to improve the end-user experience
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0029] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0030] 1 Preliminary knowledge and problem description
[0031] From the user's point of view, a user-friendly RBAC system should assign as few roles as possible to each user. In theory, users are only willing to have a role with all the permissions required to perform tasks. In fact, many application systems are also designed in this way. A basic requirement of role mining is that the mined roles should be able to completely reconstruct the original UPA, ie integrity. In other words, for any user there exists a set of role assignments such that the user gets exactly the same set of permissions through role assignment as before the assignment, and can be described as: in is the Boolean matrix multiply operator. If a user was originally assigned a permission, the user should be assigned at least one rol...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a role mining optimization modeling method meeting a user role-usage cardinality constraint. It is assumed that q candidate roles R1, R2, ..., Rq exist, and a set of all the candidate roles also can be represented as R by a matrix; meanwhile, a new Boolean marking variable set {d1, d2, ..., dq} is defined, and when dj is equal to 1, the role j appears; otherwise, the role jdoes not appear; consequently, a formula defined in the specification is workable; when dj is equal to 1, at least one value {c1j, c2j, ..., cnj} is 1, namely, at least one user has the role j, wherein Vj:dj is greater than or equal to dij, and i is greater than or equal to 1 and less than or equal to n; by loosening an integrity constraint in a first problem, a better role result can be mined probably, which is an original intention of research on a second problem; and for modeling the problem, a slack variable x'it is introduced, and under the condition of not exceeding a threshold delta, matrix reconstruction is acceptable.
Description
technical field [0001] The invention belongs to the technical field of access control mechanisms, and relates to a role mining optimization modeling method satisfying user assignment potential constraints. Background technique [0002] RBAC is considered to be one of the current mainstream access control mechanisms, and its main advantages include facilitating authorization distribution and reducing the burden of system management. In order to reflect these characteristics, enterprise organizations need to convert traditional access control systems into RBAC systems. To do this, first define a good character set. Although the problem of role definition seems simple, it is considered a costly stage in the process of implementing RBAC, posing great challenges to system builders, because they have little knowledge of the semantic information of user roles and business processes in the enterprise . [0003] The concept of role engineering was proposed by Coyne in 1995, with t...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.