Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Role mining optimization method based on enumeration mining method and potential constraints

An optimization method and role-based technology, applied in special data processing applications, instruments, digital data authentication, etc., can solve the problems of not considering the underlying access mode, time-consuming and laborious, etc.

Active Publication Date: 2018-08-17
XINYANG NORMAL UNIVERSITY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has strong semantics. However, for a large number of task functions, it is time-consuming and labor-intensive to manually set the role system, and does not consider the underlying access mode.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role mining optimization method based on enumeration mining method and potential constraints
  • Role mining optimization method based on enumeration mining method and potential constraints
  • Role mining optimization method based on enumeration mining method and potential constraints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the present invention will be further described in detail below in conjunction with specific embodiments.

[0023] 1 Preliminary knowledge and problem description

[0024] 1.1 Role mining based on enumeration method

[0025] The existing technology mines roles by enumerating different subsets of permissions at the bottom layer, and allows roles to overlap, and proposes two algorithms: full mining and fast mining. Although the former can exhaustively enumerate all candidate role sets from the user-authority assignment relationship, the time complexity is exponential and the mining efficiency is low; the latter improves the mining process and counts the number of users associated with roles, although it cannot exhaustively enumerate all roles , but the mining efficiency is better than the former. In order to reflect the efficiency and completeness of enumeration mining, the basic idea of ​​role mining based on enumeration method: for a given a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a role mining optimization method based on an enumeration mining method and user assignment potential constraints. The method includes the steps of conducting priority sortingon roles according to the number of permissions contained by the roles, and limiting the number of the roles assigned to a user by means of priorities. The algorithm description of a role priority mining method Role Priority-Based Approach (RPBA) is put forward as follows in the description.

Description

technical field [0001] The invention belongs to the technical field of access control mechanisms, and relates to a role mining optimization method based on an enumeration mining method and user assignment potential constraints. Background technique [0002] Role-based access control (RBAC) can simplify the authorization management of the system, reduce the implementation cost of the project, and ensure the integrity and confidentiality of information. It is one of the current mainstream access control mechanisms. With the successful migration and wide application of a large number of non-RBAC cases to the RBAC system, designing a complete and effective role set and constructing the RBAC system are crucial to the successful realization of the logical separation of users and permissions. Based on this, the character engineering technique and two basic methods of top-down and bottom-up are proposed. The top-down method starts from the demand analysis of engineering use cases, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F17/30
CPCG06F16/2465G06F21/31G06F2221/2141
Inventor 孙伟邵罕葛保武宋俊辉
Owner XINYANG NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products