Role mining optimization modeling method meeting user role-usage cardinality constraint

A modeling method and role technology, applied in data processing applications, special data processing applications, instruments, etc., can solve problems such as the lack of a unified standard for role sets, and achieve the effect of simplifying construction, concise mining results, and reducing mining costs.

Pending Publication Date: 2018-08-14
XINYANG NORMAL UNIVERSITY
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Potential problems of this method in the process of mining roles: lack of uniform standards for evaluating the quality of character sets
However, little research has been done to improve the end-user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role mining optimization modeling method meeting user role-usage cardinality constraint
  • Role mining optimization modeling method meeting user role-usage cardinality constraint
  • Role mining optimization modeling method meeting user role-usage cardinality constraint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] 1 Preliminary knowledge and problem description

[0031] From the user's point of view, a user-friendly RBAC system should assign as few roles as possible to each user. In theory, users are only willing to have a role with all the permissions required to perform tasks. In fact, many application systems are also designed in this way. A basic requirement of role mining is that the mined roles should be able to completely reconstruct the original UPA, ie integrity. In other words, for any user there exists a set of role assignments such that the user gets exactly the same set of permissions through role assignment as before the assignment, and can be described as: in is the Boolean matrix multiply operator. If a user was originally assigned a permission, the user should be assigned at least one rol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a role mining optimization modeling method meeting a user role-usage cardinality constraint. It is assumed that q candidate roles R1, R2, ..., Rq exist, and a set of all the candidate roles also can be represented as R by a matrix; meanwhile, a new Boolean marking variable set {d1, d2, ..., dq} is defined, and when dj is equal to 1, the role j appears; otherwise, the role jdoes not appear; consequently, a formula defined in the specification is workable; when dj is equal to 1, at least one value {c1j, c2j, ..., cnj} is 1, namely, at least one user has the role j, wherein Vj:dj is greater than or equal to dij, and i is greater than or equal to 1 and less than or equal to n; by loosening an integrity constraint in a first problem, a better role result can be mined probably, which is an original intention of research on a second problem; and for modeling the problem, a slack variable x'it is introduced, and under the condition of not exceeding a threshold delta, matrix reconstruction is acceptable.

Description

technical field [0001] The invention belongs to the technical field of access control mechanisms, and relates to a role mining optimization modeling method satisfying user assignment potential constraints. Background technique [0002] RBAC is considered to be one of the current mainstream access control mechanisms, and its main advantages include facilitating authorization distribution and reducing the burden of system management. In order to reflect these characteristics, enterprise organizations need to convert traditional access control systems into RBAC systems. To do this, first define a good character set. Although the problem of role definition seems simple, it is considered a costly stage in the process of implementing RBAC, posing great challenges to system builders, because they have little knowledge of the semantic information of user roles and business processes in the enterprise . [0003] The concept of role engineering was proposed by Coyne in 1995, with t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06Q10/06
CPCG06Q10/0639G06F16/2465
Inventor 孙伟王淑礼宋俊辉鲁骏
Owner XINYANG NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products