[1]杨勇.基于多约束关系的安全授权分析与验证[D].济南:山东大学,2009.[2]鲁剑峰.访问控制策略的安全与效用优化方法研究[D].武汉:华中科技大学,2010.[3]MA X P,LI R X,LU Z D,et al.Specifying and enforcing the principle of least privilege in role-based access control[J].Concurrency and Computation:Practice and Experience,2011,23(12):1313–1331.[4]赵同昇,朱文兴.MAX-SAT问题一种改进的局部搜索算法[J].计算机工程与科学,2008,30(11):50-52,79.[5]孙如祥,唐天兵,李炳慧.并行蚁群算法求解加权MAX-SAT[J].计算机应用研究,2012,29(1):49-51.[6]FU Z H,MALIK S.On solving the partial MAX-SAT problem[C]// SAT 2006: Proceedings of the 9th International Conference on the Theory and Application of Satisfiability Testing. Seattle:IEEE Press,2006:252-265.[7]王婷,陈性元,任志宇.授权管理中的权限衍生计算方法[J].计算机应用,2011,31(5):1291-1294.[8]王婷,陈性元,张斌,等.基于互斥角色约束的静态职责分离策略[J].计算机应用,2011,31(7):1884-1886,1890.[9]杨柳,唐卓,李仁发,等.云计算环境中基于用户访问需求的角色查找算法[J].通信学报,2011,32(7):169-175.[10]LI N H,TRIPUNITARA M V,BIZRI Z.On mutually-exclusive roles and separation of duty[J].ACM Transactions on Information and System Security,2007,10(2):42-51.[11]ZHANG Y,JOSHI J B D.UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints[C]// Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2008:83-92.[12]管蓉.DNA计算在基于角色的访问控制系统中的应用研究[D].长沙:湖南大学,2010.[13]WICKRAMAARACHCHI G T, QARDAJI W H, LI N H. An efficient framework for user authorization queries in RBAC systems[C]// Proceedings of the 14th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2009:23-32.[14]ARGELICH J, CABISCOL A, LYNCE I, et al.Regular encodings from MAX-CSP into partial MAX-SAT[C]// Proceedings of the 39th International Symposium on Multiple-Valued Logics.Piscataway: IEEE Press,2009:196-202.[15]KOSHIMURA M, ZHANG T, FUJITA H,et al.QMaxSAT: a partial MAX-SAT solver[J].Journal on Satisfiability,Boolean Modeling and Computation,2012,8(2):95-100. |