首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机软件论文--程序设计、软件工程论文--程序设计论文

基于频繁模式树和预设权限权重的角色挖掘

摘要第5-6页
Abstract第6-7页
Chapter 1 Introduction第10-15页
    1.1 Research Motivation第12-13页
    1.2 Contributions of the Study第13-14页
    1.3 Outline of the Thesis第14-15页
Chapter 2 Background and Literature Review第15-28页
    2.1 Mandatory Access Control第16-17页
    2.2 Discretionary Access Control DAC第17-18页
    2.3 Role‐based access control RBAC第18-23页
    2.4 Role Engineering第23页
    2.5 Top‐Down Approach第23-24页
    2.6 Bottom‐Up approach Role mining第24-26页
    2.7 Limitations of the Current Role Engineering Approaches第26-27页
    2.8 Summary第27-28页
Chapter 3 Role Mining Using FP-Tree第28-55页
    3.1 Frequent‐Pattern Mining第28-30页
    3.2 Preliminaries第30-31页
    3.3 FP Tree Construction第31-38页
    3.4 Integrity and Density of the FP‐Tree第38-40页
    3.5 Mining Frequent patterns of permissions based on FP‐Tree第40-45页
    3.6 Frequent‐permission Pattern Growth with Single Prefix Path of FP‐Tree第45-49页
    3.7 Role Generation based on Frequent‐permission pattern growth第49-53页
    3.8 Efficiency and Complexity of the Algorithm第53-54页
    3.9 Summary第54-55页
Chapter 4 Pre-Assigned Weighted Role Mining based on FP-Tree第55-66页
    4.1 Weights in Mining第55-56页
    4.2 Preliminaries第56-59页
    4.3 A Model for Weights of Permissions第59-60页
    4.4 Weighted Support WS第60-61页
    4.5 Weighted Confidence WC第61-62页
    4.6 Pre‐Assigned Weighted Role Mining Based on FP‐Tree第62-65页
    4.7 Summary第65-66页
Chapter 5 Results and Discussions第66-75页
    5.1 Performance on Synthetic Data第66-71页
    5.2 Performance on Real Data:第71-72页
    5.3 Execution Time第72-74页
    5.4 Summary第74-75页
Chapter 6 Conclusions and Suggestions第75-77页
Acknowledgements第77-78页
References第78-82页

论文共82页,点击 下载论文
上一篇:颈椎后路单开门椎管扩大椎板成形术治疗多节段脊髓型颈椎病疗效的研究
下一篇:塞拉利昂私有化政策的影响研究