刘江,霍如,李诚成,等.基于命名数据网络的区块链信息传输机制[J].通信学报,2018,39(1):24-33.LIU J,HUO R,LI C C,et al.Information transmission mechanism of Blockchain technology based on named-data networking[J].Journal on C...刘江,霍如,李诚成,等.基于命名数据网络的区块链信息传输机制[J].通信学报,2018,39(1):24-33.LIU J,HUO R,LI C C,et al.Information transmission mechanism of Blockchain technology based on named-data networking[J].Journal on Communications,2018,39(1):24-33.韩牟,华蕾,王良民,等.车载自组网中高效的群组协商通信协议[J].通信学报,2018,39(1):34-45.HAN M,HUA L,WANG L M,et al.Efficient communication protocol of group negotiation in VANET[J].Journal on Communications,2018,39(1):34-45.李凤华,陈天柱,王震,等.复杂网络环境下跨网访问控制机制[J].通信学报,2018,39(2):1-10.展开更多
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics...Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.展开更多
文摘刘江,霍如,李诚成,等.基于命名数据网络的区块链信息传输机制[J].通信学报,2018,39(1):24-33.LIU J,HUO R,LI C C,et al.Information transmission mechanism of Blockchain technology based on named-data networking[J].Journal on Communications,2018,39(1):24-33.韩牟,华蕾,王良民,等.车载自组网中高效的群组协商通信协议[J].通信学报,2018,39(1):34-45.HAN M,HUA L,WANG L M,et al.Efficient communication protocol of group negotiation in VANET[J].Journal on Communications,2018,39(1):34-45.李凤华,陈天柱,王震,等.复杂网络环境下跨网访问控制机制[J].通信学报,2018,39(2):1-10.
基金the financial support from Department of Science and Technology,Government of India under the grant:SR/CSRI/118/2014
文摘Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.