[1]VAIDYA J,ATLURI V,GUO Q.The role mining problem:finding a minimal descriptive set of roles[C]//Proceedings of the 12th ACM Symposium on Access Control Models and Technologies.New York,USA:ACM Press,2007:175-184.br/
[2]CLARK D D,WILSON D R.A comparison of commercial and military computer security policies[C]//Proceedings of 1987 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,1987:184-184.br/
[3]KUHN R.Mutual exclusion as a means of implementing separation of duty requirements in role based access control systems[C]//Proceedings of ACM Workshop on Role-based Access Control.New York,USA:ACM Press,1997.br/
[4]LI N,TRIPUNITARA M V,BIZRI Z.On mutually exclusive roles and separation-of-duty[J].ACM Transactions on Information and System Security,2007,10(2):5.br/
[5]HARIKA P,NAGAJYOTHI M,JOHN J C,et al.Meeting cardinality constraints in role mining[J].IEEE Transactions on Dependable and Secure Computing,2015,12(1):71-84.br/
[6]FRANK M,BUHMAN J M,BASIN D.Role mining with probabilistic models[J].ACM Transactions on Information and System Security,2013,15(4):1-28.br/
(下转第203页)
(上接第195页)
[7]SANDHU R,BHAMIDIPATI V,MUNAWER Q.The ARBAC97 model for role-based administration of roles[J].ACM Transactions on Information and System Security,1999,2(1):105-135.br/
[8]SCHAAD A,MOFFETT J,JACOB J.The role-based access control system of a European bank:a case study and discussion[C]//Proceedings of the 6th ACM Symposium on Access Control Models and Technologies.New York,USA:ACM Press,2001:3-9.br/
[9]SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].Computer,1996,29(2):38-47.br/
[10]ZHANG D,RAMAMOHANARAO K,VERSTEEG S,et al.Graph based strategies to role engineering[C]//Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research.New York,USA:ACM Press,2010:1-4.br/
[11]ROY A,SURAL S,MAJUMDAR A K.Minimum user requirement in role based access control with separation of duty constraints[C]//Proceedings of the 12th International Conference on Intelligent Systems Design and Applications.Washington D.C.,USA:IEEE Press,2013:386-391.br/
[12]ROY A,SURAL S,MAJUMDAR A K.Impact of multiple t-t SMER constraints on minimum user requirement in RBAC[M].Berlin,Germany:Springer,2014:109-128.br/
[13]KUMAR R,SURAL S,GUPTA A.Mining RBAC roles under cardinality constraint[C]//Proceedings of International Conference on Information Systems Security.Berlin,Germany:Springer,2010:171-185.br/
[14]罗钧,赵传智,汪飞.基于RBAC模型的权限高效管理方法[J].计算机研究与发展,2016,53(5):1000-1008.br/
[15]孙伟,苏辉,李艳灵.基于互斥权限约束的角色挖掘优化方法[J].计算机工程,2014,40(11):205-210.br/
[16]WEST D B.Introduction to graph theory-second edition[EB/OL].[2017-08-25].https://www.resear chgate.net/publication/242491364_Introduction_to_graph_theory_-_second_edition.br/ |