| 摘要 | 第5-6页 |
| Abstract | 第6-7页 |
| Chapter 1 Introduction | 第10-15页 |
| 1.1 Research Motivation | 第12-13页 |
| 1.2 Contributions of the Study | 第13-14页 |
| 1.3 Outline of the Thesis | 第14-15页 |
| Chapter 2 Background and Literature Review | 第15-28页 |
| 2.1 Mandatory Access Control | 第16-17页 |
| 2.2 Discretionary Access Control DAC | 第17-18页 |
| 2.3 Role‐based access control RBAC | 第18-23页 |
| 2.4 Role Engineering | 第23页 |
| 2.5 Top‐Down Approach | 第23-24页 |
| 2.6 Bottom‐Up approach Role mining | 第24-26页 |
| 2.7 Limitations of the Current Role Engineering Approaches | 第26-27页 |
| 2.8 Summary | 第27-28页 |
| Chapter 3 Role Mining Using FP-Tree | 第28-55页 |
| 3.1 Frequent‐Pattern Mining | 第28-30页 |
| 3.2 Preliminaries | 第30-31页 |
| 3.3 FP Tree Construction | 第31-38页 |
| 3.4 Integrity and Density of the FP‐Tree | 第38-40页 |
| 3.5 Mining Frequent patterns of permissions based on FP‐Tree | 第40-45页 |
| 3.6 Frequent‐permission Pattern Growth with Single Prefix Path of FP‐Tree | 第45-49页 |
| 3.7 Role Generation based on Frequent‐permission pattern growth | 第49-53页 |
| 3.8 Efficiency and Complexity of the Algorithm | 第53-54页 |
| 3.9 Summary | 第54-55页 |
| Chapter 4 Pre-Assigned Weighted Role Mining based on FP-Tree | 第55-66页 |
| 4.1 Weights in Mining | 第55-56页 |
| 4.2 Preliminaries | 第56-59页 |
| 4.3 A Model for Weights of Permissions | 第59-60页 |
| 4.4 Weighted Support WS | 第60-61页 |
| 4.5 Weighted Confidence WC | 第61-62页 |
| 4.6 Pre‐Assigned Weighted Role Mining Based on FP‐Tree | 第62-65页 |
| 4.7 Summary | 第65-66页 |
| Chapter 5 Results and Discussions | 第66-75页 |
| 5.1 Performance on Synthetic Data | 第66-71页 |
| 5.2 Performance on Real Data: | 第71-72页 |
| 5.3 Execution Time | 第72-74页 |
| 5.4 Summary | 第74-75页 |
| Chapter 6 Conclusions and Suggestions | 第75-77页 |
| Acknowledgements | 第77-78页 |
| References | 第78-82页 |