Skip to main content

ORIGINAL RESEARCH article

Front. Comput. Neurosci., 09 November 2022
This article is part of the Research Topic Mathematical Treatment of Nanomaterials and Neural Networks Volume II View all 10 articles

Research on the multi-granularity method of role engineering

\nYongmei JiaoYongmei Jiao1Menghan ZhangMenghan Zhang2Yu Wu,
Yu Wu3,4*
  • 1Sifang College, Shijiazhuang Tiedao University, Shaoxing, China
  • 2The School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou, China
  • 3School of Earth System Science, Institute of Surface-Earth System Science, Tianjin University, Tianjin, China
  • 4Tianjin Key Laboratory of Earth Critical Zone Science and Sustainable Development in Bohai Rim, Tianjin University, Tianjin, China

The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility. However, as the scale of access subjects and access objects expands, it becomes more difficult to develop a role engineering system that meets security requirements. Particle size calculation can reduce or improve the particle size of the problem and improve efficiency on the premise of obtaining satisfactory solutions. In this study, the granularity calculation method was introduced into the role formulation process of RBAC, which can effectively reduce the complexity of the problem and improve the efficiency of the RBAC role engineer. At the same time, the concept lattice reduction method was used to reduce the role concept lattice and reduce the workload of the system security administrator.

Introduction

The development of the information system has made information sharing between people more convenient and fast. However, the explosive growth of the information system has not only provided people with convenient and fast access to information but also created the problem of information security. For example, the “ZTE Incident” caused a huge loss to ZTE because the legal staff had access to confidential documents and information. The disclosure of prism makes people pay more attention to the protection of personal privacy. Ransomware attacks at hospitals, universities, and enterprises and on personal computers uses encryption algorithms to illegally encrypt the files of the victim host, forcing victims to pay a certain ransom to decrypt the files, causing huge losses to enterprises and individuals. An increasing number of security attacks and information leaks have seriously affected cyberspace security, personal privacy, and national security (Michel and King, 2019; Qiu et al., 2020).

To prevent the intrusion of illegal users, access control limits the access ability and scope of the access subject to the access object using predefined methods or policies and limits the access to resources in the information system. Access control consists of an access subject, an access object, and the operation (Fang et al., 2017). In this case, the subject is the user or the access behavior initiated by the user (such as process and thread). The object is the entity that is accessed by the subject, and all the information, resources, and objects that can be regarded as the object in access control, such as files and disks, can be operated. An operation is an action that a subject can perform, such as a read operation and a write operation.

Traditional access control models include the autonomous access control model and the mandatory access control model. In the autonomous access control model, users can freely transfer their permissions, which makes the access control very flexible, but the arbitrary transfer of permissions leads to the risk of illegal access. In the mandatory access control model, the direction of information flow is from a high-security level to a low-security level, which can guarantee that the information system cannot be accessed by illegal elements. However, the mandatory access control model can not be flexibly applied to the current flexible and changeable market environment.

The role-based access control model (RBAC) is considered an access control strategy that can effectively guarantee the security of an information system, which ensures not only the security of the system but also its flexibility. The RBAC model introduces the concept of roles between users and access by assigning (revoking) roles to users. Thus, the purpose of granting (revoking) access permissions is achieved. In this way, system management only needs to consider the granting or revoking of roles, instead of considering the granting or revoking of each permission one by one, which simplifies the work tasks of system administrators. The role discovery method based on concept lattice can obtain the non-redundant role system semiautomatically, but with the increase in the number of access objects in the system, the number of access permissions in the system will increase sharply. In this case, the role-based access control model can reduce the tasks of system administrators to some extent, but the expansion of the number of roles makes the tasks of administrators very complex.

At present, we are seeking a way to ensure the security of the system without being affected by the massive size of the role system, which becomes difficult to manage effectively. Granular computing can be used to study the same question in different granularity of discussion (Qian and Liang, 2006). In the case of ensuring a satisfactory solution, appropriately reducing the role partition granularity can effectively reduce the number of roles and reduce the complexity of the work of the system security administrator.

This study begins with a discussion on the role exploration method based on concept lattice, introduces the concept of granularity calculation into this method, finds out the appropriate calculation granularity, uses the larger granularity, reduces the size of the role system, and thus reduces the complexity of the problem.

Basic definition

The concept lattice definitions used in this study are as follows (Zhao et al., 2009; Ganter and Wille, 2012; Wei et al., 2020):

Definition 1: A context K = (U, M, I) is composed of two sets U and M and there exists a relation I between U and M. The elements of U are called objects and the elements of M are called attributes. (u, m) ∈ I or (uIm) means that the object u has an attribute m. We use (u, m)∉I to denote that object U does not possess property M.

Definition 2: Let K = (U, M, I) be a context. For AU, BM, denote f(A) = {mM|∀uA, (u, m) ∈ I} and g(B) = {uU|∀mB, (u, m) ∈ I }. If A and B satisfy that f(A) = B and g(B) = A, then we call the binary group (A, B) as a concept, where A is the extent of the concept (A, B) and B is the intent of the concept (A, B).

The set of all formal concepts is denoted as L = (U, M, I), ∀uU, with object concepts as (g(f(u)),f(u)). Similarly, for ∀mM, (g(m), f(g(m))) is called an attribute concept. In addition, for ∀(X1, B1), (X2, B2) ∈ L = (U, M, I), a partial order relationship ≤ can be defined in the sense that (X1, B1) ≤ (X2, B2) is equivalent to X1X2 and B2B1.

Definition 3: Let (U, M, I) be a formal context and if YM satisfies.

(1) Yf(g(Y)) (Yf(g(Y))) and

(2) Each pseudo-intent Y1Y has f(g(Y1)) ⊆ Y, then, Y is called a pseudo-intent.

Definition 4: Assume that set K = (U, M, I) is a context and Y1, Y2M. If g(Y1) ⊆ g(Y2), then Y1Y2 is true in K.

Definition 5: If K = (U, M, I) is a formal context, then the value dependency set {Xf(g(X))|X is the pseudo-intent of K} is the Duquenne–Guigues of K.

Definition 6: Given access security context K = (U, M, I), implication set J(K), and implication formula CDJ(K), if the attribute set TM is equivalent to CT or DT, then T is related to CD. If T is related to all the implication forms in J(K), then T is related to J(K).

Definition 7: Let R1and R2 be non-empty equivalence relations in the field of argument. If R1R2, it is said that R1 is thinner than R2 and it is denoted as R2R1 or R2R1.

The concept of granular computing involves the theory of granulation, projection, and synthesis operation of quotient space (Wang et al., 2018). Quotient space theory is a kind of theory that can imitate human beings to analyze problems from coarse to fine, from surface to interior, and from multilevel to multidimensional, to effectively reduce the complexity of problems (Li et al., 2017).

The information theory definitions used in this study are as follows:

Definition 8: (Fuzzy equivalence relation) Let RT(x,x), if

(1) ∀xX, R(x, x) = 1;

(2) ∀x, yX, R(x, y) = R(y, x); and

(3) x,y,z,R(x,z) supy(min(R(x,y),R(y,z))),

then, R is called a fuzzy equivalence relation.

Definition 9 (Savchenko, 2019): An information system is a binary S = (U, C), where U = {x1, x2, ···, xn} is a set of non-empty finite subject set, called the field of theory, and C = {a1, a2, ···, am} is a non-empty finite object set. For any aC, satisfying a:UVa, i.e., a(x) ∈ Va, xU, then Va = {a(x)|xU} is called the value range of a.

Definition 10 (Sheng et al., 2020): For an information system S = (U, C) and an arbitrary subset of non-empty propertiesBC, an equivalence relation RB can be derived on U:

RB = {(x, y) ∈ U×U:a(x) = a(y), ∀aB}.

Furthermore, a quotient set URB can be formed between RB and U, i.e., URB={[x]B:xU}, where [x]B = {yU:(x, y) ∈ RB} is the equivalent class of x on attribute B.

Research on the multi-granularity method of role engineering

The role discovery method based on concept lattice can obtain the role system in the access control system in a semiautomatic way, but not all the roles acquired are demonstrative. For example, in a school information management system, there are two roles, namely, teacher information management and teacher information management and scientific research management. These two roles overlap in practice. That is, the system only needs to have both teacher information management and scientific research management roles to meet the requirements of system security. Although the role exploration method based on concept lattice can obtain a complete role system, it does not consider the realistic significance between roles, resulting in the existence of many unnecessary roles.

The solution to the above problem is to further optimize the role system based on concept lattice so that the optimized role system can not only meet the security requirements but also achieve the minimum number, reducing the workload of the system administrator to manage the role. In contrast to the traditional optimization method (Lv and Zhang, 2017; Lv et al., 2018, 2020, 2021a,c; Zhang et al., 2020a), granularity computation, rough set, and multi-granularity decision theory can not only obtain a satisfactory solution to the problem but also effectively reduce the complexity of the problem. Therefore, the idea of granularity can be introduced into the role exploration method based on concept lattice to simplify the role system and reduce the complexity of the work of the system administrator.

Role optimization method of decision information system

Definition 11: The decision system is binary, s = (U∪{d}, C), and {U, C} is an information system (Qian et al., 2018). Here, C is called conditional property, dU is called decision property, mapping d:CVd, where Vd is the range of decision property d (Yan et al., 2020).

The object xi takes a unique observation value on the attribute aj, which is the single-granularity information system (Mi et al., 2003). If the object takes different observation values according to different scales in terms of attributes, a multi-granularity information system can be obtained (Du and Hu, 2014). Assuming that the structure of granularity level number is I, from the fine-grained to coarse-grained layered structure, the properties of each layer to Ck={a1k,a2k,···,amk},(1kI), where there is an information system Sk = (U, Ck). ajkCk,where Vjkis subjective and the range of the attribute aj layer k (Li and Li, 2015). There exists ajk+1(x)=gjk,k+1(ajk(x)),xU (Dai and Xu, 2012).

According to the basic concept of the decision system, the role system can be observed from different aspects. Based on this idea, this study proposes the following role optimization solutions.

(1) Based on the view of the multi-granularity hierarchical model, each access role is divided according to the access authority. For the role system, we classified the roles that have obvious inclusion relations, such as (teacher information management) and (teacher information management and scientific research management). The two roles are classified into one category, and so on. The division results are recorded, and the set of division results for each layer is obtained.

(2) On each level, the role exploration method based on concept lattice is incorporated into the conceptual system obtained and is divided according to the access subject. For example, the access subject is (teacher) and (teacher, director of scientific research department). The two types of subjects can be divided into one type and analogically. The division results are recorded, and the set of division results for each level is obtained.

(3) By integrating the division results of steps (1) and (2), the coordination of the decision system is assessed to obtain a multilevel granularity decision model and select the ideal role granularity.

The hierarchical division by access is shown in Figure 1.

FIGURE 1
www.frontiersin.org

Figure 1. Stratification by access permissions.

Similarly, the process of hierarchical division according to access objects is shown in Figure 2.

FIGURE 2
www.frontiersin.org

Figure 2. Stratification by access object.

According to the concept of a decision system, the results of each layer division can be verified to obtain an optimal granularity level and then to reduce the number of roles in the system according to the hierarchical relationship.

Role optimization method for conceptual lattice computing

The “Role optimization method of decision information system” section describes role optimization using the knowledge of decision information theory. This section guides on how to further optimize the role concept lattice from the perspective of the role concept lattice.

According to the basic knowledge of concept lattice, a concept lattice is composed of many concepts in the formal context and then displayed in the form of a lattice.

Example 1: Let K = (U, M, I) be a formal context, as shown in Table 1.

TABLE 1
www.frontiersin.org

Table 1. Formal context K.

According to the calculation method of concepts, the concepts in the computable formal context K are (1234, ∅), (124, df) (24, dfh), (2, dfhi), (13, cg), (4, bdfh), (1, acdefg), and (∅, abcdefghi). The concept lattice composed of concepts is shown in Figure 3.

FIGURE 3
www.frontiersin.org

Figure 3. Concept lattice.

As shown in Figure 3, in the concept lattice, all concepts are displayed in a partial order structure. The characteristics of this partial order structure can be used to find concepts that can be optimized. According to the role exploration method based on concept lattice, at the end of exploration, the obtained concept lattice is constructed by roles and users in the system. If the final role concept lattice can be optimized, the role system in the system can be optimized. Based on this idea, combined with the following definition theorem, the role concept lattice can be reduced to a certain extent.

The relevant definitions and theorems to be used are as follows (Zhao, 2018).

Definition 12: Let K = (U, M, I) be a formal context. If for ∀x1, x2, ···, xnUu, the relationship g(u)≠g(x1)∩g(x2)…g(xn) holds, then u is called a granular irreducible object.

Definition 13: Let K = (U, M, I) be a formal context. If for ∀y1, y2, ···, ynMm, f(m)≠g(y1)∩g(y2)…g(yn) holds, then u is called the particle irreducible property.

Based on the above definitions, we have the following conclusion:

Theorem 1: Let K = (U, M, I) be a formal context.

(1) ForxU-u, if g(x)⊃g(u) does not exist, then u is a granular irreducible object.

(2) ForyM-m, if g(y)⊃g(m) does not exist, then m is a granular irreducible property.

Algorithm 1 is a description of the role exploration algorithm based on the concept lattice. The algorithm borrows the attribute exploration algorithm framework in the concept lattice, takes the user as the object in the formal background of the attribute exploration algorithm, and uses the authority as the attribute to construct the formal background. Furthermore, the implication relationship between permissions is used as a problem to interact with the domain experts so as to actively assist the domain experts to construct the RBAC role system and then to construct the role concept lattice. The core process of the algorithm is as follows: First, the implication relationship between permissions is used as a problem to interact with domain experts; second, experts judge whether these questions are valid. Then, according to the different answers of experts, the implication relationship between the next permissions that need to be exchanged is calculated. Finally, the loop generates interaction problems until the algorithm reaches an end condition. At the end of the algorithm, the method can obtain the concept lattice of the role and the implication relation set among permissions of the given information system. However, when the number of users and permissions in the information system is excessive, the role concept lattice is still very large. According to the reducible attribute and reducible object theory, we proposed the RSA algorithm (Algorithm 2).

ALGORITHM 1
www.frontiersin.org

Algorithm 1. Role exploration algorithm based on concept lattice description.

ALGORITHM 2
www.frontiersin.org

Algorithm 2. RSA algorithm description.

The role concept lattice reduction algorithm, which is designed based on reducible attributes and reducible objects, further reduces the role concept lattice obtained by the role exploration method based on concept lattice, thus reducing the role system of the information system. The input of the algorithm is the concept lattice explored by the role exploration method based on the concept lattice, and the output is the reduced role concept lattice. The first and second lines of the algorithm divide concepts in concept lattice into intent and extension. The intent is composed of an attribute set, and the extension is composed of an object set. For the domain of access control, the intent is composed of a permission set, and the extension is composed of a user set. Lines 3–6 of the algorithm reduce several intents according to the definition of reducible attributes. Lines 7–10 of the algorithm reduce the collection of objects according to the reducible object definition. Finally, the reduced object and intent are recombined to obtain the reduced role concept lattice. The algorithm flow is shown in Figure 4.

FIGURE 4
www.frontiersin.org

Figure 4. RSA algorithm.

An example of the role optimization method for conceptual grain computing

This section uses an example to illustrate the running process of the RSA algorithm.

Let K = (U, M, I) be a formal context, where U=(1, 2, 3, 4, 5) and M = {a, b, c, d, e}. Here, numbers 1, 2, 3, 4, and 5 represent the dean of a college, dean of teaching, student, dean of scientific research, and dean of academic affairs, respectively. Letters a, b, c, d, and e represent enrollment information management, student registration information management, student status management, student curriculum review, and student curriculum development and modification, respectively. The relationship I between U and M is listed in Table 2 (a < b < c < d < e).

TABLE 2
www.frontiersin.org

Table 2. Formal context K.

The method of role concept lattice based on concept lattice is as follows:

The initial state is set as K0 = ∅, C0(K) = ∅, J0(K) = ∅, B0 = ∅ (refer to Table 3).

TABLE 3
www.frontiersin.org

Table 3. Formal context K0.

The counterexample object 1 that refutes the implication ø → abcde from K was removed and added to the formal background K_0 to get the formal background K_1 (refer to Table 4).

TABLE 4
www.frontiersin.org

Table 4. Formal context K1.

(1) In the formal context K0, f(g(∅)) = {abcde}. Judging ∅ → f(g(∅))−∅, i.e., ∅ → abcde holds true in K. For g(∅) = {1, 2, 3, 4} and g(abcde) = ∅ in K, considering {1, 2, 3, 4}⊈∅, ∅ → abcde does not hold in K. The counterexample object 1 that refutes the implication ∅ → abcde from K was removed and added to the formal context K0 to get the formal context K1 (refer to Table 4), where C1(K) = C0(K), B1 = B0, and J1(K) = J0(K).

(2) The process of the role exploration method is not described in this study.

The resulting intent set is {∅, d, ab, abde, abc, abcde}, and the concept set is {(1234, 5, ∅), (13, d), (124, 5, ab), (1, abde), (24, abc), (∅, abcde)}. The concept lattice composed of the above concepts is shown in Figure 5.

FIGURE 5
www.frontiersin.org

Figure 5. Role concept lattice.

According to the principle of object reduction and attribute reduction, {a, c, d} and {b, c, d} are attribute particle reduction sets, where {c, d} are core attributes and {a, b} are relatively necessary attributes. {1, 2, 3} and {1, 3, 4} are object particle reduction sets, where {1, 3} are core objects and {2, 4} are relatively necessary objects. Therefore, object {5} and attributes are optimized and reduced to simplify the permissions and users on the role concept lattice, which is beneficial for system administrators to manage the system and reduce the complexity of the role system.

Conclusion

At present, the role-based access control model occupies the mainstream position in the field of access control, but the role system for constructing RBAC is very complex. The role of an access control system can be obtained semiautomatically by using the concept lattice-based role exploration method, and the role concept can be used to obtain the role of an access control system, which is very simple and clear in form. Although the method can obtain the role system, when it is applied to the large-scale access control system, the scale of the role system obtained is also very large due to the large subject and object of access control, and the expansion of the role system makes the work of the security administrator increase dramatically. In this study, the theory of granularity computation and concept lattice reduction is introduced into the role exploration method based on concept lattice, and the role system obtained by the role exploration method is further optimized and reduced to obtain a smaller role system, which can also meet the security requirements of access control.

When the scale of the subject and object is very large, this method will be time-consuming. Therefore, the topology of concept lattice networks will be further considered in the following research (Liu et al., 2015, 2019) to better improve the time-consuming problem of this method. We will continue to explore and optimize the proposed method to further improve the robustness and performance of the algorithm. Considering that deep learning technology has been widely used in recent years (Zhang et al., 2020b, 2021a; Lv et al., 2021b, 2022, in Press), it will be introduced into access control in future research to speed up the processing speed. Therefore, the method proposed in this study can be parallelized in the next research, to better resolve the time-consuming problem of this method. In addition, it will be combined with privacy protection (Zhang et al., 2021b) to consider the practical application (Zhang et al., 2021) of the proposed method.

Data availability statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author contributions

All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.

Funding

This study was supported by the National Natural Science Foundation of China (Grant No. 42071318) and the National Defense Basic Research Projects of China (Grant No. JCKY2020908B001).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Dai, J., and Xu, Q. (2012). Approximations and uncertainty measures in incomplete information systems. Inform. Sci. 198, 62–80. doi: 10.1016/j.ins.2012.02.032

CrossRef Full Text | Google Scholar

Du, W. S., and Hu, B. Q. (2014). Approximate distribution reducts in inconsistent interval-valued ordered decision tables. Inform. Sci. 271, 93–114. doi: 10.1016/j.ins.2014.02.070

CrossRef Full Text | Google Scholar

Fang, L., Yin, L., Guo, Y., and Fang, B. (2017). A review on key technologies of attribute-based access control. J. Comput. 40, 1680–1698. doi: 10.11897/SP.J.1016.2017.01680

PubMed Abstract | CrossRef Full Text | Google Scholar

Ganter, B., and Wille, R. (2012). Formal Concept Analysis: Mathematical Foundations. Berlin: Springer Science & Business Media.

Google Scholar

Li, J., Huang, C., Qi, J., Qian, Y., and Liu, W. (2017). Three-way cognitive concept learning via multi-granularity. Inform. Sci. 378, 244–263. doi: 10.1016/j.ins.2016.04.051

CrossRef Full Text | Google Scholar

Li, S., and Li, T. (2015). Incremental update of approximations in dominance-based rough sets approach under the variation of attribute values. Inform. Sci. 294, 348–361. doi: 10.1016/j.ins.2014.09.056

CrossRef Full Text | Google Scholar

Liu, J. B., Pan, X. F., Hu, F. T., and Hu, F. F. (2015). Asymptotic laplacian-energy-like invariant of lattices. Appl. Math. Comput. 253, 205–214. doi: 10.1016/j.amc.2014.12.035

CrossRef Full Text | Google Scholar

Liu, J. B., Zhao, J., He, H., and Shao, Z. (2019). Valency-Based topological descriptors and structural property of the generalized sierpinski networks. J. Stat. Phys. 177, 1131–1147. doi: 10.1007/s10955-019-02412-2

CrossRef Full Text | Google Scholar

Lv L. Chen J. Zhang L. Zhang F. (in Press). Gradient-based neural networks for solving periodic Sylvester matrix equations. J. Franklin Inst. 10.1016/j.jfranklin.2022.05.023

Google Scholar

Lv, L., Chen, J., Zhang, Z., Wang, B., and Zhang, L. (2021a). A numerical solution of a class of periodic coupled matrix equations. J. Franklin Inst. 358, 2039–2059. doi: 10.1016/j.jfranklin.2020.11.022

CrossRef Full Text | Google Scholar

Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., and Tian, Z. (2021b). A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Trans. Indust. Inform. 18, 6474–6482. doi: 10.1109/TII.2021.3130237

CrossRef Full Text | Google Scholar

Lv, L., Wu, Z., Zhang, L., Gupta, B. B., and Tian, Z. (2022). An edge-AI based forecasting approach for improving smart microgrid efficiency. IEEE Trans. Indust. Inform. 18, 7946–7954. doi: 10.1109/TII.2022.3163137

CrossRef Full Text | Google Scholar

Lv, L., and Zhang, Z. (2017). Finite iterative solutions to periodic Sylvester matrix equations. J. Franklin Inst. 354, 2358–2370. doi: 10.1016/j.jfranklin.2017.01.004

CrossRef Full Text | Google Scholar

Lv, L., Zhang, Z., Zhang, L., and Liu, X. (2018). Gradient based approach for generalized discrete-time periodic coupled Sylvester matrix equations. J. Franklin Inst. 355, 7691–7705. doi: 10.1016/j.jfranklin.2018.07.045

CrossRef Full Text | Google Scholar

Lv, L., Zheng, C., Zhang, L., Shan, C., Tian, Z., Du, X., et al. (2021c). Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations. IEEE Trans. Green Commun. Netw. 5, 1381–1394. doi: 10.1109/TGCN.2021.3085561

CrossRef Full Text | Google Scholar

Lv, L. L., Tang, S. Y., and Zhang, L. (2020). Parametric solutions to generalized periodic Sylvester bimatrix equations. J. Franklin Inst. 357, 3601–3621. doi: 10.1016/j.jfranklin.2019.12.031

CrossRef Full Text | Google Scholar

Mi, J. S., Wu, W. Z., and Zhang, W. X. (2003). Approaches to knowledge reduction based on variable precision rough set model. Inform. Sci. 159, 255–272. doi: 10.1016/j.ins.2003.07.004

CrossRef Full Text | Google Scholar

Michel, M. C., and King, M. C. (2019). “Cyber influence of human behavior: personal and national security, privacy, and fraud awareness to prevent harm,” in 2019 IEEE International Symposium on Technology and Society (Medford, MA: IEEE).

Google Scholar

Qian, J., Liu, C., and Yue, X. (2018). Multigranulation sequential three-way decisions based on multiple thresholds. Int. J. Approx. Reas. 105, 396–416. doi: 10.1016/j.ijar.2018.12.007

CrossRef Full Text | Google Scholar

Qian, Y. H., and Liang, J. Y. (2006). “Rough set method based on multi-granulations,” in 2006 5th IEEE International Conference on Cognitive Informatics (Beijing: IEEE).

Google Scholar

Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., and Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet Things J. 7, 4682–4696. doi: 10.1109/JIOT.2020.2969326

CrossRef Full Text | Google Scholar

Savchenko, A. V. (2019). Sequential three-way decisions in multi-category image recognition with deep features based on distance factor. Inform. Sci. 489, 18–36. doi: 10.1016/j.ins.2019.03.030

CrossRef Full Text | Google Scholar

Sheng, X., Xue, Y., and Han, D. (2020). Research on object granularity decision method in access control system. J. Henan Univer. 50, 63–69. doi: 10.15991/j.cnki.411100.2020.01.007

CrossRef Full Text | Google Scholar

Wang, L., Yang, X., Chen, Y., Liu, L., An, S., and Zhuo, P. (2018). Dynamic composite decision-theoretic rough set under the change of attributes. Int. J. Comput. Intell. Syst. 11, 355. doi: 10.2991/ijcis.11.1.27

CrossRef Full Text | Google Scholar

Wei, L., Liu, L., Qi, J., and Qian, T. (2020). Rules acquisition of formal decision contexts based on three-way concept lattices. Inform. Sci. 516, 529–544. doi: 10.1016/j.ins.2019.12.024

CrossRef Full Text | Google Scholar

Yan, E., Song, J., Ren, Y., Zheng, C., Mi, B., and Hong, W. (2020). Construction of three-way attribute partial order structure via cognitive science and granular computing. Knowl. Based Syst. 197, 105859. doi: 10.1016/j.knosys.2020.105859

CrossRef Full Text | Google Scholar

Zhang, K., Wang, Y., Burokur, S. N., and Wu, Q. (2021). Generating dual-polarized vortex beam by detour phase: from phase gradient metasurfaces to metagratings. IEEE Trans. Microw. Theory Techn. 70, 200–209. doi: 10.1109/TMTT.2021.3075251

CrossRef Full Text | Google Scholar

Zhang, L., Huang, Z., Liu, W., Guo, Z., and Zhang, Z. (2021a). Weather radar echo prediction method based on convolution neural network and long short-term memory networks for sustainable e-agriculture. J. Clean. Prod. 298, 126776. doi: 10.1016/j.jclepro.2021.126776

CrossRef Full Text | Google Scholar

Zhang, L., Huo, Y., Ge, Q., Ma, Y., and Ouyang, W. (2021b). A privacy protection scheme for IOT big data based on time and frequency limitation. Wireless Commun. Mob. Comput. 2021, 1–10. doi: 10.1155/2021/5545648

CrossRef Full Text | Google Scholar

Zhang, L., Tang, S., and Lv, L. (2020a). An finite iterative algorithm for sloving periodic Sylvester bimatrix equations. J. Franklin Inst. 357, 10757–10772. doi: 10.1016/j.jfranklin.2020.07.042

CrossRef Full Text | Google Scholar

Zhang, L., Xu, C., Gao, Y., Han, Y., Du, X., and Tian, Z. (2020b). Improved Dota2 lineup recommendation model based on a bidirectional LSTM. Tsinghua Sci. Technol. 25, 712–720. doi: 10.26599/TST.2019.9010065

CrossRef Full Text | Google Scholar

Zhao, X. X., Qin, P., and Wang, J. (2009). Research on attribute exploration algorithm. Comput. Sci. Explorat. 3, 509–518. doi: 10.3969/j.issn.1673-7059.2010.04.001

CrossRef Full Text | Google Scholar

Zhao, Z. (2018). Conceptual lattice reduction based on granular computing. Shanxi Norm. Univer.

Google Scholar

Keywords: access control, role-based access control (RBAC), granularity calculation, concept lattice, role system

Citation: Jiao Y, Zhang M and Wu Y (2022) Research on the multi-granularity method of role engineering. Front. Comput. Neurosci. 16:1020277. doi: 10.3389/fncom.2022.1020277

Received: 16 August 2022; Accepted: 23 September 2022;
Published: 09 November 2022.

Edited by:

Jia-Bao Liu, Anhui Jianzhu University, China

Reviewed by:

Dongliang Xu, Shandong University, China
Guangmin Li, Hubei Normal University, China
Lijun Sun, Henan University of Technology, China

Copyright © 2022 Jiao, Zhang and Wu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Yu Wu, wu_yu@tju.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.