• Title/Summary/Keyword: Role Graph

Search Result 127, Processing Time 0.021 seconds

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

A Lattice-Based Role Graph Security Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 격자개념의 역할그래프 보안 모델)

  • Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.91-98
    • /
    • 2009
  • In this paper, this model ensures confidentiality and integrity of mandatory access cotrol policy which based on fuzzy function with importance of information. And it solves authorization abuse problem through role graph creation algorithm and flowing policy that security grade is applied. Because this model composes role hierarchy which bind similar role concept to apply to commercial environment, it has expansile advantage by large scale security system as well as is easy that add new role.

Synthesis of the Fault-Causality Graph Model for Fault Diagnosis in Chemical Processes Based On Role-Behavior Modeling (역할-거동 모델링에 기반한 화학공정 이상 진단을 위한 이상-인과 그래프 모델의 합성)

  • 이동언;어수영;윤인섭
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.5
    • /
    • pp.450-457
    • /
    • 2004
  • In this research, the automatic synthesis of knowledge models is proposed. which are the basis of the methods using qualitative models adapted widely in fault diagnosis and hazard evaluation of chemical processes. To provide an easy and fast way to construct accurate causal model of the target process, the Role-Behavior modeling method is developed to represent the knowledge of modularized process units. In this modeling method, Fault-Behavior model and Structure-Role model present the relationship of the internal behaviors and faults in the process units and the relationship between process units respectively. Through the multiple modeling techniques, the knowledge is separated into what is independent of process and dependent on process to provide the extensibility and portability in model building, and possibility in the automatic synthesis. By taking advantage of the Role-Behavior Model, an algorithm is proposed to synthesize the plant-wide causal model, Fault-Causality Graph (FCG) from specific Fault-Behavior models of the each unit process, which are derived from generic Fault-Behavior models and Structure-Role model. To validate the proposed modeling method and algorithm, a system for building FCG model is developed on G2, an expert system development tool. Case study such as CSTR with recycle using the developed system showed that the proposed method and algorithm were remarkably effective in synthesizing the causal knowledge models for diagnosis of chemical processes.

H-TREES, RESTRICTIONS OF DOWLING GROUP GEOMETRIES

  • Mphako-Banda, Eunice
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.3
    • /
    • pp.955-962
    • /
    • 2015
  • It has been established that the role played by complete graphs in graph theory is similar to the role Dowling group geometries and Projective geometries play in matroid theory. In this paper, we introduce a notion of H-tree, a class of representable matroids which play a similar role to trees in graph theory. Then we give some properties of H-trees such that when q = 0, then the results reduce to the known properties of trees in graph theory. Finally we give explicit expressions of the characteristic polynomials of H-trees, H-cycles, H-fans and H-wheels.

A Methodology for Searching Frequent Pattern Using Graph-Mining Technique (그래프마이닝을 활용한 빈발 패턴 탐색에 관한 연구)

  • Hong, June Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.1
    • /
    • pp.65-75
    • /
    • 2019
  • As the use of semantic web based on XML increases in the field of data management, a lot of studies to extract useful information from the data stored in ontology have been tried based on association rule mining. Ontology data is advantageous in that data can be freely expressed because it has a flexible and scalable structure unlike a conventional database having a predefined structure. On the contrary, it is difficult to find frequent patterns in a uniformized analysis method. The goal of this study is to provide a basis for extracting useful knowledge from ontology by searching for frequently occurring subgraph patterns by applying transaction-based graph mining techniques to ontology schema graph data and instance graph data constituting ontology. In order to overcome the structural limitations of the existing ontology mining, the frequent pattern search methodology in this study uses the methodology used in graph mining to apply the frequent pattern in the graph data structure to the ontology by applying iterative node chunking method. Our suggested methodology will play an important role in knowledge extraction.

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

A New Scheme for Watermarking Engineering Graph

  • Zhanchuan, Cai;Wei, Sun;Changzhen, Xiong;Dongxu, Qi
    • International Journal of CAD/CAM
    • /
    • v.6 no.1
    • /
    • pp.99-104
    • /
    • 2006
  • Engineering graph plays an important role in design and manufacture, such as architecture, machinery, manufacture, military. However, almost no persons consider the security and copyright of two-dimensional engineering graph. A novel method for two-dimensional engineering graph watermark based U system is proposed in this paper. Watermarks generated by this technique can be successfully extracted even after rotation, translation and scaling transform.

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

An Inquiry on the Understanding Process of Discrete Mathematics using TI-92 Calculator - Matrix and Graph- (TI-92 계산기를 활용한 이산수학의 이해과정 탐구-「행렬과 그래프」단원을 중심으로-)

  • Kang , Yun-Soo;Lee, Bo-Ra
    • Journal of the Korean School Mathematics Society
    • /
    • v.7 no.2
    • /
    • pp.81-97
    • /
    • 2004
  • This paper is a study on the understanding process of「Matrix and Graph」on discrete mathematics using TI-92 calculator. For this purpose, we investigated the understanding process of two middle school students learning the concepts of matrix and graph using TI-92 calculator. In this process, we collected qualitative data using recorder and video camera. Then we categorized these data as follows: students' attitude related to using technology, understanding process of meaning, expression and operation of matrix and graph, mathematical communication, etc. From this, we have the following conclusions: First, students inquired out the meaning and role of matrix by themselves using calculator. We could see that calculator can do the role of good learning partner to them. Second, students realized their own mistakes when they used calculator on the process of learning matrix. So we found that calculator could form the self-leading learning circumstance on learning matrix. Third, calculators reinforce the mathematical communication in learning matrix and graph. That is, calculator could be a good mediator to reinforce mathematical communication between teacher and students, among students on learning matrix and graph.

  • PDF

Improving Embedding Model for Triple Knowledge Graph Using Neighborliness Vector (인접성 벡터를 이용한 트리플 지식 그래프의 임베딩 모델 개선)

  • Cho, Sae-rom;Kim, Han-joon
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.67-80
    • /
    • 2021
  • The node embedding technique for learning graph representation plays an important role in obtaining good quality results in graph mining. Until now, representative node embedding techniques have been studied for homogeneous graphs, and thus it is difficult to learn knowledge graphs with unique meanings for each edge. To resolve this problem, the conventional Triple2Vec technique builds an embedding model by learning a triple graph having a node pair and an edge of the knowledge graph as one node. However, the Triple2 Vec embedding model has limitations in improving performance because it calculates the relationship between triple nodes as a simple measure. Therefore, this paper proposes a feature extraction technique based on a graph convolutional neural network to improve the Triple2Vec embedding model. The proposed method extracts the neighborliness vector of the triple graph and learns the relationship between neighboring nodes for each node in the triple graph. We proves that the embedding model applying the proposed method is superior to the existing Triple2Vec model through category classification experiments using DBLP, DBpedia, and IMDB datasets.