参考文献
[ 1 ] Kuhlmann M, Shohat D, Schimpf G. Role Miningrevealing
Business Roles for Security Administration
Using Data Mining Technology[C] / / Proceedings of the
8th ACM Symposium on Access Control Models and
Technologies. Como,Italy:ACM Press,2003:179-186.
[ 2 ] 马晓普. 角色工程中的角色与约束生成方法研
究[D]. 武汉:华中科技大学,2011.
[ 3 ] 马晓普,李瑞轩,胡劲纬. 访问控制中的角色工程[J].
小型微型计算机系统,2013,34(6):1301-1306.
[ 4 ] Molloy I,Chen Hong,Li Tiancheng,et al. Mining Roles
with Semantic Meanings [C] / / Proceedings of the 13th
ACM Symposium on Access Control Models and
Technologies. Estes Park,USA:ACM Press,2008:21-30.
[ 5 ] Zhang Dana, Ramamohanarao K, Ebringer T. Role
Engineering Using Graph Optimization[C] / / Proceedings
of the 12th ACM Symposium on Access Control Models
and Technologies. Sophia Antipolis,France:ACM Press,
2007:139-144.
[ 6 ] Ene A,Horne W,Milosavljevic N,et al. Fast Exact and
Heuristic Methods for Role Minimization Problems
[C ] / / Proceedings of the 13th ACM Symposium on
Access Control Models and Technologies. Estes Park, USA:ACM Press,2008:1-10.
[ 7 ] Vaidya J,Atluri V,Guo Qi. The Role Mining Problem: Finding a Minimal Description Set of Roles [ C ] / /
Proceedings of the 12th ACM Symposium on Access
Control Models and Technologies. Sophia Antipolis, France:ACM Press,2007:175-184.
[ 8 ] Ma Xiaopu,Li Ruixuan, Lu Zhengding, et al. Mining
Constraints in Role-based Access Control [ J ].
Mathematical and Computer Modelling,2012,55 (1):
87-96.
[ 9 ] Kumar R,Sural S,Gupta A. Mining RBAC Roles Under
Cardinality Constraint [ C ]/ / Proceedings of the 6th
International Conference on Information Systems Security.
Gandhinagar, India: Information Systems Security Press,
2010:171-185.
[10] Vaidya J,Atluri V,Warner J. RoleMiner:Mining Roles
Using Subset Enumeration[C] / / Proceedings of the 13th
ACM Conference on Computer and Communications
Security. Alexandria,USA:ACM Press,2006:144-153.
[11] Li Ninghui, Tripunitara M V, Bizri Z. On Mutually
Exclusive Roles and Separation of Duty [ J ]. ACM
Transactions on Information and System Security,2007,
10(2):42-51.
[12] Ma Xiaopu, Li Ruixuan, Lu Zhengding. Role Mining
Based on Weights [C] / / Proceedings of the 15th ACM
Symposium on Access Control Models and Technologies.
Pittsburgh,USA:ACM Press,2010:65-74.
[13] Li Ruixuan,Li Huaqing,Wang Wei,et al. Rminer:A Tool
Set for Role Mining[C] / / Proceedings of the 18th ACM
Symposium on Access Control Models and Technologies.
Amsterdam,Holland:ACM Press,2013:193-196.
编辑 金胡考 |