Research on Authorization Model of Attribute Access Control Based on Knowledge Graph
Communications in Computer and Information Science, ISSN: 1865-0937, Vol: 2034 CCIS, Page: 348-359
2024
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Conference Paper Description
Knowledge graph is an extended graphical data structure tool that can store interrelated data and visually display the relationships between different objects in large systems. It is widely used in various fields. This paper proposes an attribute-based knowledge graph authorization policy model. This model presents the access control authorization policy between users and resources, and can intuitively display the authorization relationships between various types of nodes, making it easier to understand and implement access control policies. Compared with the traditional text access control policy presentation form, the knowledge graph authorization model presentation form proposed in this article is more intuitive and easy to understand and has strong operability. Finally, this article implemented the knowledge graph authorization strategy model on the NEO4J platform, using Cypher statements to implement the graph traversal algorithm to effectively evaluate the accuracy of the authorization strategy. This experiment implements the access control knowledge graph on the NEO4J platform and combines Cypher statements to search and match access control policies more finely.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85189614194&origin=inward; http://dx.doi.org/10.1007/978-981-97-1274-8_23; https://link.springer.com/10.1007/978-981-97-1274-8_23; https://dx.doi.org/10.1007/978-981-97-1274-8_23; https://link.springer.com/chapter/10.1007/978-981-97-1274-8_23
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know