Research Article
A Model Study on Collaborative Learning and Exploration of RBAC Roles
Input: two access security contexts, ; Duquenne–Guigues , ; intent set , | Output: access security context , , | BEGIN | 1. =, = | 2. = | 3. WHILE (≠) | 4. IF () THEN | 5. IF () THEN | 6. Add to | 7. ELSE | 8. Add to | 9. END IF | 10. =() | 11. Continue | 12. END IF | 13. IF () THEN | 14. IF () THEN | 15. Add to | 16. ELSE | 17. Add to | 18. END IF | 19. B=() | 20. Continue | 21. END IF | 22. IF () THEN | 23. IF () THEN | 24. Add to | 25. ELSE | 26. Add to | 27. END IF | 28. B=() | 29. Continue | 30. END IF | 31. IF () THEN | 32. IF () THEN | 33. Add to | 34. ELSE | 35. Add to | 36. END IF | 37. B=() | 38. Continue | 39. END IF | 40. IF (≠) | 41. =() | 42. ELSE | 43. =() | 44. END IF | 45. END WHILE | 46. END |
|