Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th...Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.展开更多
An IMC-PID controller was proposed for unstable second-order time delay system which shows the characteristics of inverse response(RHP zero). A plot of Ms versus λ was suggested to calculate the suitable tuning param...An IMC-PID controller was proposed for unstable second-order time delay system which shows the characteristics of inverse response(RHP zero). A plot of Ms versus λ was suggested to calculate the suitable tuning parameter λ, which provides a trade-off between performance and robustness. Six different forms of process models were selected from literature to show the applicability of the present method. Performance of controller was calculated by ITAE and total variation TV and compared with recently published tuning rules. Undesirable overshoot was removed by using a set-point weighting parameter. Robustness was tested by introducing a perturbation into the various model parameters and closed-loop results show that the designed controller is robust in the case of model uncertainty. The proposed method shows an overall better closed-loop response as compared to other recently reported methods.展开更多
基金Project(61003140) supported by the National Natural Science Foundation of ChinaProject(013/2010/A) supported by Macao Science and Technology Development FundProject(10YJC630236) supported by Social Science Foundation for the Youth Scholars of Ministry of Education of China
文摘Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.
基金India (MHRD, India) for providing financial support
文摘An IMC-PID controller was proposed for unstable second-order time delay system which shows the characteristics of inverse response(RHP zero). A plot of Ms versus λ was suggested to calculate the suitable tuning parameter λ, which provides a trade-off between performance and robustness. Six different forms of process models were selected from literature to show the applicability of the present method. Performance of controller was calculated by ITAE and total variation TV and compared with recently published tuning rules. Undesirable overshoot was removed by using a set-point weighting parameter. Robustness was tested by introducing a perturbation into the various model parameters and closed-loop results show that the designed controller is robust in the case of model uncertainty. The proposed method shows an overall better closed-loop response as compared to other recently reported methods.