Minimal role mining method for Web service composition

来源 :Journal of Zhejiang University-Science C(Computer & Electron | 被引量 : 0次 | 上传用户:rocklysun
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Web service composition is a low cost and efficient way to leverage the existing resource and implementation.In current Web service composition implementations,the issue of how to define the role for a new composite Web service has been little addressed.Adjusting the access control policy for a new composite Web service always causes substantial administration overhead from the security administrator.Furthermore,the distributed nature of Web service based applications makes traditional role mining methods obsolete.In this paper,we analyze the minimal role mining problem for Web service composition,and prove that this problem is NP-complete.We propose a sub-optimal greedy algorithm based on the analysis of necessary role mapping for interoperation across multiple domains.Simulation shows the effectiveness of our algorithm,and compared to the existing methods,our algorithm has significant performance advantages.We also demonstrate the practical application of our method in a real agent based Web service system.The results show that our method could find the minimal role mapping efficiently. Web service composition is a low cost and efficient way to leverage the existing resource and implementation.In current web service composition implementations, the issue of how to define the role for a new composite Web service has been little addressed. Adjusting the access control policy for a new composite Web service always commands substantial administration overhead from the security administrator. Futurertherm, the distributed nature of Web service based applications makes traditional role mining methods obsolete. In this paper, we analyze the minimal role mining problem for Web service composition, and prove that this problem is NP-complete. We propose a sub-optimal greedy algorithm based on the analysis of necessary role mapping for interoperation across multiple domains. Simulation shows the effectiveness of our algorithm, and compared to the existing methods, our algorithm has significant performance advantages.We also demonstrate the practical application of our method in a real agent b ased Web service system.The results show that our method could find the minimal role mapping efficiently.
其他文献
“做县委书记就要做焦裕禄式的县委书记,始终做到心中有党、心中有民、心中有责、心中有戒。”习总书记在与中央党校第一期县委书记研修班学员进行座谈时提出的“四有”要求,
Previous studies have demonstrated that Helicobacter pylori infection is associated with coronary atherosclerotic heart disease, but the correlation between Hel
To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malici
是从被研究的全部对象中抽取部分对象进行的调查的统称。它与普查、报表制度等全面调查不同,属于非全面调查。在抽样调查中,被研究对象的全体称为总体、母体、全及总体或统
用“新云”垦沃国际化  11月21日,喜来登酒店的宴会厅内,联想集团举办了济南“新云力量”企业级解决方案品鉴会,集中展示了以ThinkServer和System x产品组合为核心构建的一系列平台级和行业专属解决方案。参观者不时为联想新产品性能的提升之快感到惊讶,包括定位于成长型企业应用的ThinkServer TD350,以及为电信、互联网云计算数据中心客户设计的ThinkServer RD550
美国作家特伦斯·E.迪尔说过:“每一所学校都有其不可言传的独特之处,这种独特之处就叫做‘文化’。”优秀的、创新的学校文化是一所学校赖以生存、实现可持续发展的支柱。实
7月14日,商业企业秘书长联席会在新世界股份公司召开今年第三次会议,专题研讨“互联网+思想政治工作”。与会者紧扣国有企业面临的形势和任务,就思想政治工作如何应对互联网
当学校为每个孩子创造丰富、可选择的课程时,也是在为他们提供丰富、可选择的公共生活。2010年以来,江苏省溧阳市实验小学的课堂教学改革迈入深水区。我们发现,变革课堂教学
大口径舰炮通常指100毫米以上口径的舰炮。二战后,由于航空武器的发展和导弹武器的出现,舰炮变成了水面舰艇的辅助武器,大口径舰炮的发展进入了一个低潮,装舰数量大幅度减少,
人的生命力可区分为相互联系的生理生命力与心理生命力两种。生理生命力是指机体各种组织器官的功能状态,总的表现为新陈代谢水平。一般说来,青少年的新陈代谢旺盛,其生理生