Top-Down Heuristics for Multi-Dimensional Partitioning To Satisfy Imprecision Bounds
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
Role-based Access Control (RBAC) agrees to important permissions on objects based on roles in an organization. An RBAC policy configuration is collected of a set of Users (U), a set of Roles (R), and a set of Permissions (P). The access control policies describe selection predicates obtainable to roles at the same time as the privacy obligation is to please the k-anonymity orl-diversity. An additional constraint that wants to be content by the PPM is the imprecision bound for each selection predicate. In our formulation of the aforementioned problem we suggest heuristics for anonymization algorithms and demonstrate empirically that the proposed approach gratify imprecision bounds for additional permissions and has subordinate total imprecision than the present state of the art.
Authors and Affiliations
V Anasuya, Penmetsa V. Krishna Raja, Aruna Rekha Gollapalli
Essentiality of Localized On-demand Link State (LOLS) Routing in IP Network
Network failure is the complete or partial failure of network component or components. The techniques like Failure Carrying Packet (FCP), Tunneling, Packet Re-cycling (PR), Multiple Routing Configuration (MRC) etc ha...
A Novel Technique for Creative Problem-Solving by using Q-learning and Association algorithm
for a single problem there are multiple solutions or multiple ideas from different users. Means every one gave an idea (solution) for solving the given problem if we distribute that particular problem to the different...
Privacy Preserving using Slicing Technique
Privacy Preserving on microdata publishing different anonymization techniques named as generalization and bucketization have been proposed. In generalization amount of information loses on high-dimensional data. Buc...
A Comparitive Study of Cloud Computing Models for Academic Environment
Cloud computing is becoming main computing paradigm. The use of cloud computing has been increased exponentially. It has various characteristics and advantages of on-demand computing, shared infrastructure, pay-per-u...
Fake Currency Detection Using Image Processing and Other Standard Methods
Counterfeit money is imitation currency produced without the legal sanction of the state or government. Producing or using this fake money is a form of fraud or forgery. Counterfeiting is as old as money itself, and...