Fast Exact and Heuristic Methods for Role Minimization Problems


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Fast Exact and Heuristic Methods for Role Minimization Problems
# 1  
Old 04-22-2008
Fast Exact and Heuristic Methods for Role Minimization Problems

HPL-2008-33 Fast Exact and Heuristic Methods for Role Minimization Problems - Ene, Alina; Horne, William; Milosavljevic, Nikola; Rao, Prasad; Schreiber, Robert; Tarjany, Robert E.
Keyword(s): role mining, role-based access control
Abstract: We describe several new bottom-up approaches to problems in role engineering for Role-Based Access Control (RBAC). The salient problems are all NP-complete, even to approximate, yet we find that in instances that arise in practice these problems can be solved in minutes. We first consider role minim ...
Full Report

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Why do these 2 methods result in different outcomes?

I've been troubleshooting a ksh93 script I wrote today and have narrowed it down to the root cause. but I don't understand why? so, i've written the following script to demonstrate the problem i found today: #!/bin/ksh method=$1 FILE_LIST=( $(find /someplace -type f -printf... (10 Replies)
Discussion started by: BLinux
10 Replies

2. Shell Programming and Scripting

echo exact xml tag from an exact file

Im stumped on this one. Id like to echo into a .txt file all names for an xml feed in a huge folder. Can that be done?? Id need to echo <name>This name</name> in client.xml files. $path="/mnt/windows/path" echo 'recording names' cd "$path" for names in $path than Im stuck on... (2 Replies)
Discussion started by: graphicsman
2 Replies

3. Shell Programming and Scripting

QUESTION1: grep only exact string. QUESTION2: find and replace only exact value with sed

QUESTION1: How do you grep only an exact string. I am using Solaris10 and do not have any GNU products installed. Contents of car.txt CAR1_KEY0 CAR1_KEY1 CAR2_KEY0 CAR2_KEY1 CAR1_KEY10 CURRENT COMMAND LINE: WHERE VARIABLE CAR_NUMBER=1 AND KEY_NUMBER=1 grep... (1 Reply)
Discussion started by: thibodc
1 Replies

4. Homework & Coursework Questions

Heuristic Algorithm Example Analysis

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: It's a three step algorithm and it works fine. But I am trying to prove that it is not always true. See my... (3 Replies)
Discussion started by: sureshcisco
3 Replies

5. Homework & Coursework Questions

Heuristic Algorithm Example

Give a counter example such that the following heuristic algorithm, for the 2-tape problem, doesn't always produce the best solution: Algorithm: Sort {Xi} in descending order. Place files in tapes one at a time. For a file being considered, assign the file to the smaller tape. Thanks in... (1 Reply)
Discussion started by: sureshcisco
1 Replies

6. UNIX for Advanced & Expert Users

yum provides methods

What is the difference between these yum provides and whatprovides methods? I know provides and whatprovides give the same results, but different methods of */ and \* give different results. Also whether you put */ and \* in front of the string or behind the string give different results. I have... (0 Replies)
Discussion started by: cokedude
0 Replies

7. Shell Programming and Scripting

Methods For Debugging Perl Problems

Note: Not a programmer by profession but occasionally have to program. I am looking for general methods and freely/readily available tools employed to debug problems during development of perl scripts. Anything that has really helped you out with problems you just couldn't find. A couple of... (5 Replies)
Discussion started by: Vi-Curious
5 Replies

8. What is on Your Mind?

Role of AI in any OS

In any given operating system, generally how much of AI software is involved? Is it related to user-friendliness of OS? What is the future of strong AI? (3 Replies)
Discussion started by: MULTIVERSE
3 Replies
Login or Register to Ask a Question
RDF::Crypt::Role::DoesVerify(3pm)			User Contributed Perl Documentation			 RDF::Crypt::Role::DoesVerify(3pm)

NAME
RDF::Crypt::Role::DoesVerify - verification methods DESCRIPTION
Class Methods "verify_manifest($manifest)" Given a manifest created by the Signer, attempts to verify each signature in it. Returns a list of RDF::Crypt::ManifestItem objects. May also be called as an object method in which case it ignores the manifest's information about who signed each thing, and instead assumes that the current object's keys are sufficient to verify the signature. Object Methods "verify_model($model, $signature)" Returns true if verification was successful; false but defined if verification failed; undefined if verification was not attempted for some reason. "verify_embedded_turtle($turtle, $baseuri)" Counterpart to "sign_embed_turtle" from RDF::Crypt::Role::DoesSign. "verify_embedded_rdfxml($xml, $baseuri)" Counterpart to "sign_embed_rdfxml" from RDF::Crypt::Role::DoesSign. "verify_embedded_rdfa($html, $baseuri, \%config)" Counterpart to "sign_embed_rdfa" from RDF::Crypt::Role::DoesSign. "verify_text($str, $signature)" Verifies a character string which may or may not have anything to do with RDF. Required Methods This role does not implement these methods, but requires classes to implement them instead: "verify_bytes($str, $signature)" Verifies that an octet string satisfies the signature. "SIG_MARK" Returns a string used as a marker for signatures within serialised RDF. SEE ALSO
RDF::Crypt, RDF::Crypt::Verifier, RDF::Crypt::Signer. BUGS
Please report any bugs to <http://rt.cpan.org/>. AUTHOR
Toby Inkster <tobyink@cpan.org>. COPYRIGHT
Copyright 2010, 2012 Toby Inkster This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. DISCLAIMER OF WARRANTIES
THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. perl v5.14.2 2012-06-25 RDF::Crypt::Role::DoesVerify(3pm)