CN108805432A - A kind of property estimation of enterprise method - Google Patents
A kind of property estimation of enterprise method Download PDFInfo
- Publication number
- CN108805432A CN108805432A CN201810540944.6A CN201810540944A CN108805432A CN 108805432 A CN108805432 A CN 108805432A CN 201810540944 A CN201810540944 A CN 201810540944A CN 108805432 A CN108805432 A CN 108805432A
- Authority
- CN
- China
- Prior art keywords
- role
- assets
- model
- value
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Game Theory and Decision Science (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of property estimation of enterprise methods, including:According to company information dynamic construction RBAC model, obtained and the relevant permission proportion coefficients of role-security by RBAC model;Design assets are worth base vector, intrinsic assets value vector and assets value transfer matrix;According to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, it carries out assets value and transmits interative computation, convergence is finally obtained, doing claim proportion coefficients to convergency value using permission proportion coefficients converts, and transformation results are property estimation of enterprise vector.Property estimation of enterprise pattern is become more flexible, but also entire appraisal procedure is more close to the assets of enterprise point by this method by introducing access control model.
Description
Technical field
The present invention relates to information technology field more particularly to a kind of property estimation of enterprise methods.
Background technology
Traditional asset evaluation method often makes assessment from the entity value of enterprise, but in corporate operation process
In, permission can influence the value distribution of entire enterprise.And assets assessment should be dynamic, can shift in real time, and
And information assets value can be embodied.The adjustment of personnel, the change of business can all shift value.Therefore, whole
In a evaluation process in view of permission arrive influence when be very it is necessary to.
RBAC (Role-Based Access Control, access control based roles) model believes the role of personnel
Breath and authority information associate, and the distribution and management of permission can be carried out by way of access control.In business data
Its institutional framework can be generally preserved, and in actual analysis, it can more take a fancy to business structure.Because of the real-time variation of business and people
Member's adjustment so that the behavioral characteristics for the service layer that cannot be withdrawn deposit based on the RBAC model that institutional framework constructs.Meanwhile at present
The scheme of assets assessment is not carried out using RBAC model.
Invention content
The object of the present invention is to provide a kind of property estimation of enterprise methods, and the shadow of permission is introduced in asset evaluation method
It rings, and by dynamic construction RBAC authority models, reaches the update being distributed to assets.
The purpose of the present invention is what is be achieved through the following technical solutions:
A kind of property estimation of enterprise method, including:
According to company information dynamic construction RBAC model, obtained and the relevant permission proportion of role-security by RBAC model
The factor;
Design assets are worth base vector, intrinsic assets value vector and assets value transfer matrix;
According to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, carry out
Assets value transmits interative computation, finally obtains convergence, and doing claim proportion coefficients to convergency value using permission proportion coefficients converts,
Transformation results are property estimation of enterprise vector.
As seen from the above technical solution provided by the invention, by introducing access control model, enterprise assets are commented
Estimating pattern becomes more flexible, but also entire appraisal procedure is more close to the assets of enterprise point.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is a kind of flow chart of property estimation of enterprise method provided in an embodiment of the present invention.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this
The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, belongs to protection scope of the present invention.
The embodiment of the present invention provides a kind of property estimation of enterprise method, which is dynamic, can be shifted in real time,
And information assets value can be embodied.Enterprise assets can all be worth and shift by the adjustment of personnel, the change of business;Cause
This, in view of the influence that permission is brought in entire evaluation process, by dynamic construction RBAC role cultivatings, in conjunction with its corresponding pa
Tired support distribution, we can obtain the corresponding permission factor of each role.Before design iteration equation, pass through RBAC role
Tree, devises assets value transfer matrix, passes through the variation of the transmission Dynamic Display assets of information.It is distributed basal orientation in conjunction with assets
Amount, devises an iteration formula, and increase permission factor transformation.Before being iterated operation, also introduces permission and assets are commented
Coverage (that is, the impact factor α of permission proportion to assets) and information assets the outflow proportion estimated (can be flowed in assets
Dynamic, transfer part, proportion β) two reference values, and have modified corresponding iteration component.
As shown in Figure 1, for the flow chart of property estimation of enterprise method, include mainly:
1, it according to company information dynamic construction RBAC model, is obtained and the relevant permission ratio of role-security by RBAC model
Repeated factor.
In the embodiment of the present invention, RBAC model is a kind of Role-based access control model, is broadly divided into four kinds:Substantially
Model RBAC0, role hierarchy model RBAC1, role's limited model RBAC2 and unified model RBAC3.
Wherein, basic model RBAC0 includes four parts:User, role, session and license;Role hierarchy model RBAC1
Role succession is introduced, the layering to role has been reached;Role's limited model RBAC2 introduces analysis of responsibility SSD and DSD, increases
Role assignment AC, including mutually exclusive roles, constraint base and prerequisite constraint are added;Unified model RBAC3 combine RBAC1 and
The introducing condition of RBAC2, has reached unified model.
In the embodiment of the present invention, the construction RBAC model is unified model RBAC3, can be with for the department of nearly 100 people
Extract 6-7 kind roles, user corresponds to one or more of which role, the permission between role should have inheritance and mutually
Reprimand relationship.During actually runing, the permission of the direct correlation personnel of each business is opened and is closed frequently, and under
Layer personnel also can be regular temporary shift.Therefore, we define two kinds of macroscopical role categories before refinement:Fixed angles
Color and temporary role;For static character, it is relatively low (that is, regular will not adjusting) that position will not adjust frequency, personal
The identity and authority information update period is relatively long;For temporary role, position can become with the adjustment and change of business
More (that is, the regular adjustment of meeting), personal identification and authority information update cycle are relatively short.
Dynamic RBAC Model is constructed using by institutional framework and business structure:HR departments can preserve institutional framework, pass through
The basic role cultivating of organizational information construction;For basic role cultivating, the father node of its leaf node and leaf node is cropped,
Obtain static character tree;The role that static character tree is included at this time is static character, to obtain static character set FR
(Fixed Role);According to the definition of static character, sets primary cutting and obtain the period of static character tree as t_fixed;
After obtaining static character set FR, enterprise personnel set is set as S, to obtain temporary role set TR
(Temporary role);
Using the business information of personnel in business structure (business datum collection) dynamic lookup temporary role set TR, if faced
When role be a certain business responsible person, according to business-level, search with the same level traffic of department, and be considered as neighbor node,
Increase respective nodes in static character tree;Otherwise, by temporary role hook under corresponding static character node;By a partial node
The dynamic construction of RBAC role cultivatings namely the dynamic construction of RBAC model are realized in point update;
From the top down, rank distribution is presented in role cultivating;For enterprise, permission distribution is distributed close to Pareto, needle
To business data, matching Pareto function is found, according to RBAC role cultivating height, corresponding authority value is obtained, to ask
Go out the permission proportion coefficients of each role node:L1,L2,L3,…。
2, design assets value base vector, intrinsic assets value vector and assets value transfer matrix.
According to RBAC role cultivating node numbers n (namely enterprise's number), initialization assets value base vector and intrinsic assets
Value vector.
Initializing assets value base vector is:X0=(1/n, 1/n, 1/n ...)T;
Initializing intrinsic assets value vector is:IV=(1/n, 1/n, 1/n ...)T;
Above-mentioned two initialization vector indicates that the assets that everyone is possessed in enterprise before the iteration are the flat of total assets
Mean value;
Design assets value Transfer matrix:
D=[d11,d12,d13,…,d1n
d21,d22,d23,…,d2n
…
dn1,dn2,dn3,…,dnn]
Wherein, dij defines two role nodes of i, j with the presence or absence of assets transfer;
1≤i≤n, 1≤j≤n;Father node, child node represent in corporate business, and assets transfer can be carried out between corresponding two people,
Namely there are business relationship between superior and subordinate or tissue relationship between superior and subordinate.In view of the influence of business, after query traffic data collection,
Think can there is assets transfer between same group member, thus in assets value transfer matrix in a small group it is all at
Setting dij is 1 between member.
In the embodiment of the present invention, each explanation of nouns is as follows:
Assets value vector:According to Corporate Asset Management situation, distribution of the assets between personnel is obtained, is to be with personnel
The vector of unit;
Assets value base vector:Initialize distribution situation of the assets between personnel;
Intrinsic assets value vector:Quantify in assets can not transfer part, and initialize its distribution situation;
Assets value transfer matrix:Quantify the transferable part in assets, quantifies assets transmittance process, according to RBAC model
Transfer matrix is formed, coefficient is 1 between transferable personnel, other are 0;
Permission proportion coefficients:Influence value of everyone permission to assets.
3, according to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, into
Row assets value transmits interative computation, finally obtains convergence, and doing claim proportion coefficients to convergency value using permission proportion coefficients becomes
It changes, transformation results are property estimation of enterprise vector.
Permission proportion coefficients are α to the impact factor of assets, and assets are shifted with beta ratio in information exchanging process;Wherein,
α can find match point with β according to enterprise personnel open-ended situation and corresponding Pareto distribution function;
Design is following iterative, carries out assets value and transmits interative computation:
Xt+1=β DXt+(1-β)IV;
Wherein, t indicates iterations;
Judge the vectorial X after current iterationt+1With the vectorial X after last iterationtBetween difference whether be less than threshold value
(such as 0.01);If so, being judged to restraining, into next step, permission factor transformation;Otherwise, continue iterative cycles;It will be final
Convergency value be denoted as XT。
To convergency value XTThe transformation of claim proportion coefficients is done, X is obtainedresult:
In order to make it easy to understand, being illustrated to said program with reference to a specific example.
In this example, actual measurement enterprise is the minority enterprise of 30 people, has complete formula port data, data on flows, industry
Data of being engaged in and terminal data.
Step 1:Basic role cultivating is constructed by organizational information, sets t_fixed=30, is i.e. the update cycle is one
Month, and beta pruning obtains static character tree.
Step 2:By business datum collection dynamic carry temporary role node, t_temp=1 is set, i.e. the update cycle is 1
It.
Step 3:The port number opened by analyzing enterprise servers, in conjunction with RBAC role cultivatings, it is right that we are fitted its
The Pareto distribution function answered obtains its corresponding authority value, and normalization obtains permission proportion coefficients (can be according to personnel's name
Sequencing):
Permission=(0.04813793,0.01797648,0.05797058,0.06756265,0.02370829,
0.03238957,0.00214481,0.02536391,0.02042478,0.02649018,0.02424631,0.02230351,
0.06874883,0.03936578,0.04037971,0.0437007,0.01391327,0.02578971,0.05923415,
0.03649142,0.01478569,0.0418708,0.00903219,0.02216529,0.05463656,0.0113638,
0.06883787,0.00511335,0.01434014,0.06151176)T
Step 4:Initialize assets value base vector and intrinsic assets value vector:
X0=(1/30,1/30,1/30 ...)T;
IV=(1/30,1/30,1/30 ...)T;
Step 5:Assets value transfer matrix is found out, due to the assets value transfer matrix constructed from RBAC role cultivatings merely
Tissue level is related only to, thus matrix is more sparse, specific setting method is as follows:
1≤i≤n, 1≤j≤n;In view of the influence of business, after query traffic data collection, it is believed that between same group member
There can be an assets transfer, thus in assets value transfer matrix with dij is arranged between all members in a small group be 1, square
Battle array is as follows:
D=[[1,1,1,1,0,1,0,0,1,0,0,1,0,1,1,0,1,1,1,0,1,1,1,0,0,0,0,0,1,0], [0,
0,1,0,0,0,1,0,0,0,0,1,0,1,0,0,1,1,1,1,1,0,0,1,0,1,0,1,0,0],[1,1,0,0,0,1,1,1,
1,1,1,0,0,1,1,0,0,1,0,1,1,1,0,0,0,1,1,0,1,1],[1,0,1,0,1,0,1,0,1,1,1,0,0,1,1,
0,1,1,0,0,1,0,1,0,1,1,1,1,1,0],[1,1,0,0,0,0,0,0,1,0,0,1,1,0,1,0,0,1,1,0,0,0,
0,0,1,0,1,1,1,1],[0,0,1,1,0,0,0,0,0,1,1,1,0,1,0,1,0,0,1,1,0,1,1,1,0,1,1,1,1,
1],[1,0,0,0,0,0,1,1,0,1,1,0,1,0,1,0,0,0,1,1,1,1,1,0,0,1,0,0,1,0],[1,0,1,1,1,
1,0,0,1,0,1,0,0,0,0,0,0,1,1,1,0,0,1,1,0,0,0,1,1,1],[0,0,1,1,0,1,0,1,1,1,1,1,
0,1,1,1,1,0,0,0,1,1,1,0,1,1,0,0,1,1],[1,1,1,1,1,1,0,1,0,1,0,0,1,0,0,1,1,0,0,
0,0,0,0,1,1,1,0,1,1,0],[0,0,0,0,1,0,0,1,1,0,1,0,1,0,0,1,1,0,1,0,1,1,1,0,1,0,
1,1,0,1],[1,1,1,1,1,0,0,1,0,0,0,1,0,0,1,0,1,0,1,0,0,0,1,1,1,0,0,0,0,0],[0,1,
0,0,0,1,0,1,0,0,0,0,1,1,0,1,1,0,0,0,1,1,1,0,1,0,1,0,1,0],[1,0,1,1,0,1,1,0,1,
1,1,0,1,0,1,1,1,0,1,1,1,0,0,0,1,0,1,1,1,0],[1,1,1,1,0,1,1,1,1,1,1,1,0,0,0,0,
1,1,1,1,1,0,1,1,0,0,0,0,0,1],[0,1,0,0,0,0,1,1,0,0,0,0,1,0,1,1,1,0,0,1,0,0,0,
1,1,1,0,1,0,1],[0,0,1,0,1,0,0,1,0,0,0,0,0,0,1,1,1,1,0,1,0,0,1,1,0,0,1,0,0,0],
[1,1,1,0,1,0,1,1,0,1,0,0,0,0,0,0,0,0,1,1,1,0,1,0,1,0,0,1,0,1],[0,1,1,1,1,1,0,
0,0,1,1,1,0,1,1,1,1,0,1,1,1,1,1,1,1,0,0,0,0,0],[0,1,1,0,1,1,1,0,0,0,0,0,0,1,
0,0,0,1,1,1,1,0,1,1,1,1,0,1,1,1],[1,0,1,0,1,0,1,1,1,0,1,1,1,0,1,1,1,1,1,0,1,
1,1,1,0,0,1,0,1,1],[1,0,1,0,1,0,1,0,0,0,1,1,0,1,0,1,0,1,1,1,0,0,1,1,0,1,0,1,
0,0],[1,1,0,0,0,1,0,0,0,1,0,1,0,1,0,1,1,1,1,0,0,1,1,0,1,1,1,0,1,0],[1,0,0,1,
0,0,1,1,0,0,0,0,1,0,0,0,0,1,1,0,1,1,1,0,1,1,0,1,0,0],[0,1,1,1,0,0,0,0,1,1,0,
0,0,1,0,1,1,0,1,0,0,1,1,1,0,0,1,0,1,0],[1,1,0,1,1,1,0,1,1,0,0,1,1,0,0,1,0,1,
0,0,0,0,1,0,1,1,1,1,1,0],[1,0,0,0,0,0,1,0,0,1,0,0,1,0,0,1,0,0,1,1,0,0,0,1,0,
1,1,0,1,0],[0,1,0,0,1,0,1,1,1,0,1,1,1,1,0,0,1,1,0,1,1,0,0,0,1,0,0,0,1,1],[1,
1,1,0,0,1,0,0,1,1,1,1,0,0,1,0,0,1,1,1,0,0,0,0,1,1,1,0,0,1],[0,0,0,0,1,1,0,1,
1,0,1,0,0,1,0,0,1,1,0,0,0,0,0,1,0,1,1,1,1,0]]
Step 6:Permission is α to the impact factor of assets, and assets are shifted with beta ratio in information exchanging process, according to end
The corresponding Pareto distribution function of slogan, we search out match point:α=0.8, β=0.8.
Step 7:It carries out assets value and transmits interative computation:
Xt+1=β DXt+(1-β)IV;
Wherein, t indicates iterations;
X1=(0.23333333,0.32666667,0.48666667,0.18666667,0.35333333,0 .16,
0.38,0.80666667,0.51333333,0.43333333,0.40666667,0.35333333,0.35333333,
0.91333333,0.51333333,0.75333333,0.13,0.38,0.51333333,0.46,0.76666667,
0.40666667,0.43333333,0.35333333,0.38,0.46,0.23,0.43333333,0.83333333,
0.35333333)T
Step 8:Judge the vectorial X after current iterationt+1With the vectorial X after last iterationtBetween difference whether be less than
Threshold value (such as 0.01);If so, being judged to restraining, it is transferred to step 9, permission factor transformation;Otherwise, return to step 7 continues to change
Generation cycle;Final convergency value is denoted as XT。
Illustratively, by interative computation, assets value base vector X convergency values XTFor:
(0.13955583,0.10752809,0.05993383,0.25833768,0.01051573,0.03582287,
0.10866783,0.1860121,0.16597193,0.14059915,0.00548543,0.04250599,0.23830328,
0.14721892,0.06542916,0.14968865,0.00931452,0.15250506,0.0569773,0.16802401,
0.04862965,0.09834337,0.07013725,0.05820365,0.04023986,0.03139021,0.06790608,
0.05027718,0.00126999,0.0017696)T
Since the difference between iterative value twice is in 0.01, difference average value is 0.003, it can be considered that it is received
It holds back.
Step 9:To convergency value XTThe transformation of claim proportion coefficients is done, X is obtainedresult, the assets branch after permission influence
Value:
Illustratively:
Xresult=(0.06748613,0.04101562,0.02500624,0.03557661,0.24138559,
0.02779229,0.16123379,0.03597364,0.02604216,0.0231675,0.01075997,0.01434608,
0.00577691,0.03199153,0.02486956,0.00318271,0.0197507,0.0654496,0.13248301,
0.12277499,0.04328474,0.05081336,0.04998311,0.0489259,0.0525699,0.01632755,
0.03258324,0.11204351,0.03814539,0.03925866)T
Interpretation of result:Finally obtained privilege matrix includes larger permission 0.24,0.16,0.13,0.12,0.11,
Two root nodes and three child nodes of RBAC model in enterprise are corresponded exactly to, therefore, they are at corresponding permission proportion
0.24、0.16、0.13、0.12、0.11。
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment can
By software realization, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding,
The technical solution of above-described embodiment can be expressed in the form of software products, the software product can be stored in one it is non-easily
In the property lost storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are with so that a computer is set
Standby (can be personal computer, server or the network equipment etc.) executes the method described in each embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art is in the technical scope of present disclosure, the change or replacement that can be readily occurred in,
It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claims
Subject to enclosing.
Claims (4)
1. a kind of property estimation of enterprise method, which is characterized in that including:
According to company information dynamic construction RBAC model, by RBAC model obtain with the relevant permission proportion of role-security because
Son;
Design assets are worth base vector, intrinsic assets value vector and assets value transfer matrix;
According to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, assets are carried out
Value delivery interative computation finally obtains convergence, and doing claim proportion coefficients to convergency value using permission proportion coefficients converts, transformation
As a result it is property estimation of enterprise vector.
2. a kind of property estimation of enterprise method according to claim 1, which is characterized in that RBAC model is a kind of based on angle
The access control model of color is broadly divided into four kinds:Basic model RBAC0, role hierarchy model RBAC1, role's limited model
RBAC2 and unified model RBAC3;
Wherein, basic model RBAC0 includes four parts:User, role, session and license;Role hierarchy model RBAC1 is introduced
Role succession, has reached the layering to role;Role's limited model RBAC2 introduces analysis of responsibility SSD and DSD, increases
Role assignment AC, including mutually exclusive roles, constraint base and prerequisite constraint;Unified model RBAC3 combines RBAC1 and RBAC2
Introducing condition, reached unified model.
3. a kind of property estimation of enterprise method according to claim 1 or 2, which is characterized in that described according to company information
Dynamic construction RBAC model, obtained by RBAC model include with the relevant permission proportion coefficients of role-security:
The construction RBAC model is unified model RBAC3, defines two kinds of macroscopical role categories:Static character and interim angle
Color;For static character, it is relatively low that position will not adjust frequency, personal identification with the authority information update cycle relatively
It is long;For temporary role, position can be changed with the adjustment and change of business, personal identification and authority information update cycle
It is relatively short;
Dynamic RBAC Model is constructed using by institutional framework and business structure:Basic role is constructed by organizational information
Tree;For basic role cultivating, the father node of its leaf node and leaf node is cropped, obtains static character tree;It fixes at this time
The role that role cultivating is included is static character, to obtain static character set FR;According to the definition of static character, setting
Primary cut obtains the period of static character tree as t_fixed;
After obtaining static character set FR, enterprise personnel set is set as S, to obtain temporary role set TR;
Using the business information of personnel in business structure dynamic lookup temporary role set TR, if temporary role is a certain business
Responsible person searches with the same level traffic of department, and be considered as neighbor node, increases in static character tree according to business-level
Respective nodes;Otherwise, by temporary role hook under corresponding static character node;By a node updates, RBAC is realized
The dynamic construction of role cultivating namely the dynamic construction of RBAC model;
From the top down, rank distribution is presented in role cultivating;For enterprise, permission distribution is distributed close to Pareto, for enterprise
Industry data find matching Pareto function, according to RBAC role cultivating height, corresponding authority value are obtained, so as to find out each
The permission proportion coefficients of a role node:L1,L2,L3,…。
4. a kind of property estimation of enterprise method stated according to claim 1, which is characterized in that
According to RBAC role cultivating role node number n, initialization assets value base vector and intrinsic assets value vector;
Initializing assets value base vector is:X0=(1/n, 1/n, 1/n ...)T;
Initializing intrinsic assets value vector is:IV=(1/n, 1/n, 1/n ...)T;
Design assets value Transfer matrix:
D=[d11,d12,d13,…,d1n
d21,d22,d23,…,d2n
…
dn1,dn2,dn3,…,dnn]
Wherein, dij defines two role nodes of i, j with the presence or absence of assets transfer;
Permission proportion coefficients are α to the impact factor of assets, and assets are shifted with beta ratio in information exchanging process;
Design is following iterative, carries out assets value and transmits interative computation:
Xt+1=β DXt+(1-β)IV;
Wherein, t indicates iterations;
Judge the vectorial X after current iterationt+1With the vectorial X after last iterationtBetween difference whether be less than threshold value;If so,
Then it is judged to restraining, into next step, permission factor transformation;Otherwise, continue iterative cycles;Final convergency value is denoted as XT;
To convergency value XTThe transformation of claim proportion coefficients is done, X is obtainedresult:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810540944.6A CN108805432A (en) | 2018-05-30 | 2018-05-30 | A kind of property estimation of enterprise method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810540944.6A CN108805432A (en) | 2018-05-30 | 2018-05-30 | A kind of property estimation of enterprise method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108805432A true CN108805432A (en) | 2018-11-13 |
Family
ID=64089379
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810540944.6A Pending CN108805432A (en) | 2018-05-30 | 2018-05-30 | A kind of property estimation of enterprise method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108805432A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112995200A (en) * | 2019-01-11 | 2021-06-18 | 深圳联合产权交易所股份有限公司 | Resource value evaluation user management method based on cloud platform and related product |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
CN103778510A (en) * | 2014-01-23 | 2014-05-07 | 北京荣之联科技股份有限公司 | Task management method and device for quantifying task value |
CN104156905A (en) * | 2014-08-15 | 2014-11-19 | 西安交通大学 | Taxpayer interest association network-based key monitored enterprise evaluation method |
CN104767813A (en) * | 2015-04-08 | 2015-07-08 | 江苏国盾科技实业有限责任公司 | Public bank big data service platform based on openstack |
CN104951903A (en) * | 2015-07-08 | 2015-09-30 | 安徽兆尹信息科技有限责任公司 | Custom asset evaluation method based on financial asset management system architecture |
CN105488699A (en) * | 2015-12-25 | 2016-04-13 | 国信优易数据有限公司 | Data asset value assessment method |
CN106991523A (en) * | 2017-03-16 | 2017-07-28 | 国网江苏省电力公司扬州供电公司 | The electric service value assessment method and system of customer-orientation |
-
2018
- 2018-05-30 CN CN201810540944.6A patent/CN108805432A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
CN103778510A (en) * | 2014-01-23 | 2014-05-07 | 北京荣之联科技股份有限公司 | Task management method and device for quantifying task value |
CN104156905A (en) * | 2014-08-15 | 2014-11-19 | 西安交通大学 | Taxpayer interest association network-based key monitored enterprise evaluation method |
CN104767813A (en) * | 2015-04-08 | 2015-07-08 | 江苏国盾科技实业有限责任公司 | Public bank big data service platform based on openstack |
CN104951903A (en) * | 2015-07-08 | 2015-09-30 | 安徽兆尹信息科技有限责任公司 | Custom asset evaluation method based on financial asset management system architecture |
CN105488699A (en) * | 2015-12-25 | 2016-04-13 | 国信优易数据有限公司 | Data asset value assessment method |
CN106991523A (en) * | 2017-03-16 | 2017-07-28 | 国网江苏省电力公司扬州供电公司 | The electric service value assessment method and system of customer-orientation |
Non-Patent Citations (1)
Title |
---|
王晓兰等: "基于角色的访问控制在房地产评估***中的应用研究", 《电子商务》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112995200A (en) * | 2019-01-11 | 2021-06-18 | 深圳联合产权交易所股份有限公司 | Resource value evaluation user management method based on cloud platform and related product |
CN112995201A (en) * | 2019-01-11 | 2021-06-18 | 深圳联合产权交易所股份有限公司 | Resource value evaluation processing method based on cloud platform and related device |
CN112995201B (en) * | 2019-01-11 | 2022-07-12 | 深圳联合产权交易所股份有限公司 | Resource value evaluation processing method based on cloud platform and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Crane-Droesch | Machine learning methods for crop yield prediction and climate change impact assessment in agriculture | |
Wardhana et al. | Agro-clusters and rural poverty: a spatial perspective for West Java | |
Delignette-Muller et al. | fitdistrplus: An R package for fitting distributions | |
Watson et al. | Identifying critical regions in small-world marine metapopulations | |
Billionnet | Mathematical optimization ideas for biodiversity conservation | |
Wilks | Interannual variability and extreme-value characteristics of several stochastic daily precipitation models | |
Fisher et al. | Assessing uncertainties in a second‐generation dynamic vegetation model caused by ecological scale limitations | |
Bickel et al. | A nonparametric view of network models and Newman–Girvan and other modularities | |
Pillsbury et al. | Another tool in the toolbox? Using fire and grazing to promote bird diversity in highly fragmented landscapes | |
Chatzopoulos et al. | Adaptation and climate change impacts: a structural Ricardian analysis of farm types in Germany | |
Davendra et al. | Complex network analysis of differential evolution algorithm applied to flowshop with no-wait problem | |
CN108804565B (en) | Knowledge representation learning-based collaborative matrix decomposition method | |
CN109190053A (en) | One kind being based on point of interest importance and the authoritative point of interest recommended method of user | |
Stufler | Gibbs partitions: The convergent case | |
La Sala et al. | Spatial modelling for low pathogenicity avian influenza virus at the interface of wild birds and backyard poultry | |
Nathan et al. | A dynamic algorithm for updating katz centrality in graphs | |
Susca et al. | Top eigenpair statistics for weighted sparse graphs | |
Toyonaga et al. | A crop planning problem with fuzzy random profit coefficients | |
Letham et al. | Bayesian inference of arrival rate and substitution behavior from sales transaction data with stockouts | |
CN108805432A (en) | A kind of property estimation of enterprise method | |
Adhikari et al. | Corona product of signed graphs and its application to modeling signed networks | |
Zhao et al. | Identifying influential nodes based on graph signal processing in complex networks | |
Wootton et al. | Species' traits and food‐web complexity interactively affect a food web's response to press disturbance | |
Pandey et al. | Context dependent preferential attachment model for complex networks | |
Mortier et al. | Mixture of inhomogeneous matrix models for species‐rich ecosystems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181113 |
|
RJ01 | Rejection of invention patent application after publication |