Research Article

A Model Study on Collaborative Learning and Exploration of RBAC Roles

Algorithm 1

algorithm description.
Input: two access security contexts, ; Duquenne–Guigues , ; intent set ,
Output: access security context , ,
BEGIN
1. =, =
2. =
3. WHILE ()
4. IF () THEN
5. IF () THEN
6.  Add to
7. ELSE
8.  Add to
9. END IF
10.  =()
11.  Continue
12. END IF
13. IF () THEN
14.  IF () THEN
15.   Add to
16.  ELSE
17.   Add to
18.  END IF
19.  B=()
20.  Continue
21. END IF
22.  IF () THEN
23.   IF () THEN
24.    Add to
25.   ELSE
26.    Add to
27.   END IF
28.   B=()
29.   Continue
30.  END IF
31.  IF () THEN
32.   IF () THEN
33.    Add to
34.   ELSE
35.    Add to
36.   END IF
37.   B=()
38.   Continue
39. END IF
40. IF ()
41.  =()
42. ELSE
43.  =()
44. END IF
45. END WHILE
46. END