Analysis on abnormal behavior of insider threats based on accesslog mining

W Peichao, Z Yun, Z Cheng, H Jincai… - CAAI Trans. Intell …, 2017 - tis.hrbeu.edu.cn
Using an access control system is an important method of guarding key places, and it can
effectively prohibit the entry of unauthorized users. However, many recent cases indicate that …

[PDF][PDF] 基于角色的设计模式建模和实现方法

何成万, 何克清 - 2006 - jos.org.cn
… overlapping, traceability, and difficulties in reusing the pattern code. A role-based
approach for design pattern modeling and implementation is proposed. In this …

细粒度同异步偏序权限建模角色访问控制模型

刘鹏远, 李彤, 孙宝林, 蒋国银 - 云南大学学报(自然科学版), 2014 - yndxxb.ynu.edu.cn
… Abstract: The RBAC (Role Based Access Control) application improved system usability
and robustness. This paper analysised the RBAC model, and pointed out some deficiencies in …

[PDF][PDF] 基于MDA 的设计模式建模与模型转换

张天[1, 张岩[1, 于笑丰[1, 王林章[1, 李宣东[1 - 2008 - Citeseer
… A role-based approach to design pattern modeling and implementation. Journal of
Software, 2006,17(4):658-669 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/…

[PDF][PDF] 基于构件的软件框架与角色扩展形态研究

刘瑜, 张世琨, 王立福, 杨芙清 - 2003 - jos.org.cn
patterns, design patterns and parameterizations approaches are helpful to design role
extension for different domain variability types. Some issues on composing application

[PDF][PDF] An ontology-driven framework to support the dynamic formation of an 價

C Kuziemsky, N Catal, D Rosu, M Carrier… - International Journal of …, 2020 - researchgate.net
… The distinction between role-based and capabilitybased assignment of a clinician to a
task is similar to the distinction between the role-based and attribute-based access control …

[PDF][PDF] 多维关注分离的模型驱动过程框架设计方法

段玉聪, 顾毓清 - 软件学报, 2006 - Citeseer
… Issues in the design and implementation of a concern-space modeling schema. 2001.
http://www.research.ibm.com/hyperspace/workshops/icse2001/Papers/sutton.pdf [24] Plasil F, …

利用隔離使用者內容實現輕量級跨站偽造要求

宋穎昌, 謝續平 - 2009 - ir.lib.nycu.edu.tw
… Now, we discuss the relationship between the three properties with role-based access
control in our proposed scheme. As mentioned above, “exec” does not provide the rules of …

面向在线社会网络的信任关系挖掘

张宇, 于彤 - 计算机科学技术学报, 2012 - jcst.ict.ac.cn
… We adopt two kinds of reasoning patterns: one is role-based reasoning, and the other is
behavior-based reasoning. First, we define the following notations. U denotes the set of user …

一种面向信息系统的通用角色集成管理方法研究

于淼, 王延章 - 信息与控制, 2004 - xk.sia.cn
… Detailed research has been made on the role theory, modeling and application. T he …
Propose NIST standard for role-based access control [ J] . ACM Transactions on Information …