CN108805432A - A kind of property estimation of enterprise method - Google Patents

A kind of property estimation of enterprise method Download PDF

Info

Publication number
CN108805432A
CN108805432A CN201810540944.6A CN201810540944A CN108805432A CN 108805432 A CN108805432 A CN 108805432A CN 201810540944 A CN201810540944 A CN 201810540944A CN 108805432 A CN108805432 A CN 108805432A
Authority
CN
China
Prior art keywords
role
assets
model
value
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810540944.6A
Other languages
Chinese (zh)
Inventor
程绍银
刘冲
蒋凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN201810540944.6A priority Critical patent/CN108805432A/en
Publication of CN108805432A publication Critical patent/CN108805432A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of property estimation of enterprise methods, including:According to company information dynamic construction RBAC model, obtained and the relevant permission proportion coefficients of role-security by RBAC model;Design assets are worth base vector, intrinsic assets value vector and assets value transfer matrix;According to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, it carries out assets value and transmits interative computation, convergence is finally obtained, doing claim proportion coefficients to convergency value using permission proportion coefficients converts, and transformation results are property estimation of enterprise vector.Property estimation of enterprise pattern is become more flexible, but also entire appraisal procedure is more close to the assets of enterprise point by this method by introducing access control model.

Description

A kind of property estimation of enterprise method
Technical field
The present invention relates to information technology field more particularly to a kind of property estimation of enterprise methods.
Background technology
Traditional asset evaluation method often makes assessment from the entity value of enterprise, but in corporate operation process In, permission can influence the value distribution of entire enterprise.And assets assessment should be dynamic, can shift in real time, and And information assets value can be embodied.The adjustment of personnel, the change of business can all shift value.Therefore, whole In a evaluation process in view of permission arrive influence when be very it is necessary to.
RBAC (Role-Based Access Control, access control based roles) model believes the role of personnel Breath and authority information associate, and the distribution and management of permission can be carried out by way of access control.In business data Its institutional framework can be generally preserved, and in actual analysis, it can more take a fancy to business structure.Because of the real-time variation of business and people Member's adjustment so that the behavioral characteristics for the service layer that cannot be withdrawn deposit based on the RBAC model that institutional framework constructs.Meanwhile at present The scheme of assets assessment is not carried out using RBAC model.
Invention content
The object of the present invention is to provide a kind of property estimation of enterprise methods, and the shadow of permission is introduced in asset evaluation method It rings, and by dynamic construction RBAC authority models, reaches the update being distributed to assets.
The purpose of the present invention is what is be achieved through the following technical solutions:
A kind of property estimation of enterprise method, including:
According to company information dynamic construction RBAC model, obtained and the relevant permission proportion of role-security by RBAC model The factor;
Design assets are worth base vector, intrinsic assets value vector and assets value transfer matrix;
According to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, carry out Assets value transmits interative computation, finally obtains convergence, and doing claim proportion coefficients to convergency value using permission proportion coefficients converts, Transformation results are property estimation of enterprise vector.
As seen from the above technical solution provided by the invention, by introducing access control model, enterprise assets are commented Estimating pattern becomes more flexible, but also entire appraisal procedure is more close to the assets of enterprise point.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is a kind of flow chart of property estimation of enterprise method provided in an embodiment of the present invention.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
The embodiment of the present invention provides a kind of property estimation of enterprise method, which is dynamic, can be shifted in real time, And information assets value can be embodied.Enterprise assets can all be worth and shift by the adjustment of personnel, the change of business;Cause This, in view of the influence that permission is brought in entire evaluation process, by dynamic construction RBAC role cultivatings, in conjunction with its corresponding pa Tired support distribution, we can obtain the corresponding permission factor of each role.Before design iteration equation, pass through RBAC role Tree, devises assets value transfer matrix, passes through the variation of the transmission Dynamic Display assets of information.It is distributed basal orientation in conjunction with assets Amount, devises an iteration formula, and increase permission factor transformation.Before being iterated operation, also introduces permission and assets are commented Coverage (that is, the impact factor α of permission proportion to assets) and information assets the outflow proportion estimated (can be flowed in assets Dynamic, transfer part, proportion β) two reference values, and have modified corresponding iteration component.
As shown in Figure 1, for the flow chart of property estimation of enterprise method, include mainly:
1, it according to company information dynamic construction RBAC model, is obtained and the relevant permission ratio of role-security by RBAC model Repeated factor.
In the embodiment of the present invention, RBAC model is a kind of Role-based access control model, is broadly divided into four kinds:Substantially Model RBAC0, role hierarchy model RBAC1, role's limited model RBAC2 and unified model RBAC3.
Wherein, basic model RBAC0 includes four parts:User, role, session and license;Role hierarchy model RBAC1 Role succession is introduced, the layering to role has been reached;Role's limited model RBAC2 introduces analysis of responsibility SSD and DSD, increases Role assignment AC, including mutually exclusive roles, constraint base and prerequisite constraint are added;Unified model RBAC3 combine RBAC1 and The introducing condition of RBAC2, has reached unified model.
In the embodiment of the present invention, the construction RBAC model is unified model RBAC3, can be with for the department of nearly 100 people Extract 6-7 kind roles, user corresponds to one or more of which role, the permission between role should have inheritance and mutually Reprimand relationship.During actually runing, the permission of the direct correlation personnel of each business is opened and is closed frequently, and under Layer personnel also can be regular temporary shift.Therefore, we define two kinds of macroscopical role categories before refinement:Fixed angles Color and temporary role;For static character, it is relatively low (that is, regular will not adjusting) that position will not adjust frequency, personal The identity and authority information update period is relatively long;For temporary role, position can become with the adjustment and change of business More (that is, the regular adjustment of meeting), personal identification and authority information update cycle are relatively short.
Dynamic RBAC Model is constructed using by institutional framework and business structure:HR departments can preserve institutional framework, pass through The basic role cultivating of organizational information construction;For basic role cultivating, the father node of its leaf node and leaf node is cropped, Obtain static character tree;The role that static character tree is included at this time is static character, to obtain static character set FR (Fixed Role);According to the definition of static character, sets primary cutting and obtain the period of static character tree as t_fixed;
After obtaining static character set FR, enterprise personnel set is set as S, to obtain temporary role set TR (Temporary role);
Using the business information of personnel in business structure (business datum collection) dynamic lookup temporary role set TR, if faced When role be a certain business responsible person, according to business-level, search with the same level traffic of department, and be considered as neighbor node, Increase respective nodes in static character tree;Otherwise, by temporary role hook under corresponding static character node;By a partial node The dynamic construction of RBAC role cultivatings namely the dynamic construction of RBAC model are realized in point update;
From the top down, rank distribution is presented in role cultivating;For enterprise, permission distribution is distributed close to Pareto, needle To business data, matching Pareto function is found, according to RBAC role cultivating height, corresponding authority value is obtained, to ask Go out the permission proportion coefficients of each role node:L1,L2,L3,…。
2, design assets value base vector, intrinsic assets value vector and assets value transfer matrix.
According to RBAC role cultivating node numbers n (namely enterprise's number), initialization assets value base vector and intrinsic assets Value vector.
Initializing assets value base vector is:X0=(1/n, 1/n, 1/n ...)T
Initializing intrinsic assets value vector is:IV=(1/n, 1/n, 1/n ...)T
Above-mentioned two initialization vector indicates that the assets that everyone is possessed in enterprise before the iteration are the flat of total assets Mean value;
Design assets value Transfer matrix:
D=[d11,d12,d13,…,d1n
d21,d22,d23,…,d2n
dn1,dn2,dn3,…,dnn]
Wherein, dij defines two role nodes of i, j with the presence or absence of assets transfer; 1≤i≤n, 1≤j≤n;Father node, child node represent in corporate business, and assets transfer can be carried out between corresponding two people, Namely there are business relationship between superior and subordinate or tissue relationship between superior and subordinate.In view of the influence of business, after query traffic data collection, Think can there is assets transfer between same group member, thus in assets value transfer matrix in a small group it is all at Setting dij is 1 between member.
In the embodiment of the present invention, each explanation of nouns is as follows:
Assets value vector:According to Corporate Asset Management situation, distribution of the assets between personnel is obtained, is to be with personnel The vector of unit;
Assets value base vector:Initialize distribution situation of the assets between personnel;
Intrinsic assets value vector:Quantify in assets can not transfer part, and initialize its distribution situation;
Assets value transfer matrix:Quantify the transferable part in assets, quantifies assets transmittance process, according to RBAC model Transfer matrix is formed, coefficient is 1 between transferable personnel, other are 0;
Permission proportion coefficients:Influence value of everyone permission to assets.
3, according to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, into Row assets value transmits interative computation, finally obtains convergence, and doing claim proportion coefficients to convergency value using permission proportion coefficients becomes It changes, transformation results are property estimation of enterprise vector.
Permission proportion coefficients are α to the impact factor of assets, and assets are shifted with beta ratio in information exchanging process;Wherein, α can find match point with β according to enterprise personnel open-ended situation and corresponding Pareto distribution function;
Design is following iterative, carries out assets value and transmits interative computation:
Xt+1=β DXt+(1-β)IV;
Wherein, t indicates iterations;
Judge the vectorial X after current iterationt+1With the vectorial X after last iterationtBetween difference whether be less than threshold value (such as 0.01);If so, being judged to restraining, into next step, permission factor transformation;Otherwise, continue iterative cycles;It will be final Convergency value be denoted as XT
To convergency value XTThe transformation of claim proportion coefficients is done, X is obtainedresult
In order to make it easy to understand, being illustrated to said program with reference to a specific example.
In this example, actual measurement enterprise is the minority enterprise of 30 people, has complete formula port data, data on flows, industry Data of being engaged in and terminal data.
Step 1:Basic role cultivating is constructed by organizational information, sets t_fixed=30, is i.e. the update cycle is one Month, and beta pruning obtains static character tree.
Step 2:By business datum collection dynamic carry temporary role node, t_temp=1 is set, i.e. the update cycle is 1 It.
Step 3:The port number opened by analyzing enterprise servers, in conjunction with RBAC role cultivatings, it is right that we are fitted its The Pareto distribution function answered obtains its corresponding authority value, and normalization obtains permission proportion coefficients (can be according to personnel's name Sequencing):
Permission=(0.04813793,0.01797648,0.05797058,0.06756265,0.02370829, 0.03238957,0.00214481,0.02536391,0.02042478,0.02649018,0.02424631,0.02230351, 0.06874883,0.03936578,0.04037971,0.0437007,0.01391327,0.02578971,0.05923415, 0.03649142,0.01478569,0.0418708,0.00903219,0.02216529,0.05463656,0.0113638, 0.06883787,0.00511335,0.01434014,0.06151176)T
Step 4:Initialize assets value base vector and intrinsic assets value vector:
X0=(1/30,1/30,1/30 ...)T
IV=(1/30,1/30,1/30 ...)T
Step 5:Assets value transfer matrix is found out, due to the assets value transfer matrix constructed from RBAC role cultivatings merely Tissue level is related only to, thus matrix is more sparse, specific setting method is as follows:
1≤i≤n, 1≤j≤n;In view of the influence of business, after query traffic data collection, it is believed that between same group member There can be an assets transfer, thus in assets value transfer matrix with dij is arranged between all members in a small group be 1, square Battle array is as follows:
D=[[1,1,1,1,0,1,0,0,1,0,0,1,0,1,1,0,1,1,1,0,1,1,1,0,0,0,0,0,1,0], [0, 0,1,0,0,0,1,0,0,0,0,1,0,1,0,0,1,1,1,1,1,0,0,1,0,1,0,1,0,0],[1,1,0,0,0,1,1,1, 1,1,1,0,0,1,1,0,0,1,0,1,1,1,0,0,0,1,1,0,1,1],[1,0,1,0,1,0,1,0,1,1,1,0,0,1,1, 0,1,1,0,0,1,0,1,0,1,1,1,1,1,0],[1,1,0,0,0,0,0,0,1,0,0,1,1,0,1,0,0,1,1,0,0,0, 0,0,1,0,1,1,1,1],[0,0,1,1,0,0,0,0,0,1,1,1,0,1,0,1,0,0,1,1,0,1,1,1,0,1,1,1,1, 1],[1,0,0,0,0,0,1,1,0,1,1,0,1,0,1,0,0,0,1,1,1,1,1,0,0,1,0,0,1,0],[1,0,1,1,1, 1,0,0,1,0,1,0,0,0,0,0,0,1,1,1,0,0,1,1,0,0,0,1,1,1],[0,0,1,1,0,1,0,1,1,1,1,1, 0,1,1,1,1,0,0,0,1,1,1,0,1,1,0,0,1,1],[1,1,1,1,1,1,0,1,0,1,0,0,1,0,0,1,1,0,0, 0,0,0,0,1,1,1,0,1,1,0],[0,0,0,0,1,0,0,1,1,0,1,0,1,0,0,1,1,0,1,0,1,1,1,0,1,0, 1,1,0,1],[1,1,1,1,1,0,0,1,0,0,0,1,0,0,1,0,1,0,1,0,0,0,1,1,1,0,0,0,0,0],[0,1, 0,0,0,1,0,1,0,0,0,0,1,1,0,1,1,0,0,0,1,1,1,0,1,0,1,0,1,0],[1,0,1,1,0,1,1,0,1, 1,1,0,1,0,1,1,1,0,1,1,1,0,0,0,1,0,1,1,1,0],[1,1,1,1,0,1,1,1,1,1,1,1,0,0,0,0, 1,1,1,1,1,0,1,1,0,0,0,0,0,1],[0,1,0,0,0,0,1,1,0,0,0,0,1,0,1,1,1,0,0,1,0,0,0, 1,1,1,0,1,0,1],[0,0,1,0,1,0,0,1,0,0,0,0,0,0,1,1,1,1,0,1,0,0,1,1,0,0,1,0,0,0], [1,1,1,0,1,0,1,1,0,1,0,0,0,0,0,0,0,0,1,1,1,0,1,0,1,0,0,1,0,1],[0,1,1,1,1,1,0, 0,0,1,1,1,0,1,1,1,1,0,1,1,1,1,1,1,1,0,0,0,0,0],[0,1,1,0,1,1,1,0,0,0,0,0,0,1, 0,0,0,1,1,1,1,0,1,1,1,1,0,1,1,1],[1,0,1,0,1,0,1,1,1,0,1,1,1,0,1,1,1,1,1,0,1, 1,1,1,0,0,1,0,1,1],[1,0,1,0,1,0,1,0,0,0,1,1,0,1,0,1,0,1,1,1,0,0,1,1,0,1,0,1, 0,0],[1,1,0,0,0,1,0,0,0,1,0,1,0,1,0,1,1,1,1,0,0,1,1,0,1,1,1,0,1,0],[1,0,0,1, 0,0,1,1,0,0,0,0,1,0,0,0,0,1,1,0,1,1,1,0,1,1,0,1,0,0],[0,1,1,1,0,0,0,0,1,1,0, 0,0,1,0,1,1,0,1,0,0,1,1,1,0,0,1,0,1,0],[1,1,0,1,1,1,0,1,1,0,0,1,1,0,0,1,0,1, 0,0,0,0,1,0,1,1,1,1,1,0],[1,0,0,0,0,0,1,0,0,1,0,0,1,0,0,1,0,0,1,1,0,0,0,1,0, 1,1,0,1,0],[0,1,0,0,1,0,1,1,1,0,1,1,1,1,0,0,1,1,0,1,1,0,0,0,1,0,0,0,1,1],[1, 1,1,0,0,1,0,0,1,1,1,1,0,0,1,0,0,1,1,1,0,0,0,0,1,1,1,0,0,1],[0,0,0,0,1,1,0,1, 1,0,1,0,0,1,0,0,1,1,0,0,0,0,0,1,0,1,1,1,1,0]]
Step 6:Permission is α to the impact factor of assets, and assets are shifted with beta ratio in information exchanging process, according to end The corresponding Pareto distribution function of slogan, we search out match point:α=0.8, β=0.8.
Step 7:It carries out assets value and transmits interative computation:
Xt+1=β DXt+(1-β)IV;
Wherein, t indicates iterations;
X1=(0.23333333,0.32666667,0.48666667,0.18666667,0.35333333,0 .16, 0.38,0.80666667,0.51333333,0.43333333,0.40666667,0.35333333,0.35333333, 0.91333333,0.51333333,0.75333333,0.13,0.38,0.51333333,0.46,0.76666667, 0.40666667,0.43333333,0.35333333,0.38,0.46,0.23,0.43333333,0.83333333, 0.35333333)T
Step 8:Judge the vectorial X after current iterationt+1With the vectorial X after last iterationtBetween difference whether be less than Threshold value (such as 0.01);If so, being judged to restraining, it is transferred to step 9, permission factor transformation;Otherwise, return to step 7 continues to change Generation cycle;Final convergency value is denoted as XT
Illustratively, by interative computation, assets value base vector X convergency values XTFor:
(0.13955583,0.10752809,0.05993383,0.25833768,0.01051573,0.03582287, 0.10866783,0.1860121,0.16597193,0.14059915,0.00548543,0.04250599,0.23830328, 0.14721892,0.06542916,0.14968865,0.00931452,0.15250506,0.0569773,0.16802401, 0.04862965,0.09834337,0.07013725,0.05820365,0.04023986,0.03139021,0.06790608, 0.05027718,0.00126999,0.0017696)T
Since the difference between iterative value twice is in 0.01, difference average value is 0.003, it can be considered that it is received It holds back.
Step 9:To convergency value XTThe transformation of claim proportion coefficients is done, X is obtainedresult, the assets branch after permission influence Value:
Illustratively:
Xresult=(0.06748613,0.04101562,0.02500624,0.03557661,0.24138559, 0.02779229,0.16123379,0.03597364,0.02604216,0.0231675,0.01075997,0.01434608, 0.00577691,0.03199153,0.02486956,0.00318271,0.0197507,0.0654496,0.13248301, 0.12277499,0.04328474,0.05081336,0.04998311,0.0489259,0.0525699,0.01632755, 0.03258324,0.11204351,0.03814539,0.03925866)T
Interpretation of result:Finally obtained privilege matrix includes larger permission 0.24,0.16,0.13,0.12,0.11, Two root nodes and three child nodes of RBAC model in enterprise are corresponded exactly to, therefore, they are at corresponding permission proportion 0.24、0.16、0.13、0.12、0.11。
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment can By software realization, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding, The technical solution of above-described embodiment can be expressed in the form of software products, the software product can be stored in one it is non-easily In the property lost storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are with so that a computer is set Standby (can be personal computer, server or the network equipment etc.) executes the method described in each embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art is in the technical scope of present disclosure, the change or replacement that can be readily occurred in, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claims Subject to enclosing.

Claims (4)

1. a kind of property estimation of enterprise method, which is characterized in that including:
According to company information dynamic construction RBAC model, by RBAC model obtain with the relevant permission proportion of role-security because Son;
Design assets are worth base vector, intrinsic assets value vector and assets value transfer matrix;
According to assets value base vector, intrinsic assets value vector and assets value transfer matrix design iteration formula, assets are carried out Value delivery interative computation finally obtains convergence, and doing claim proportion coefficients to convergency value using permission proportion coefficients converts, transformation As a result it is property estimation of enterprise vector.
2. a kind of property estimation of enterprise method according to claim 1, which is characterized in that RBAC model is a kind of based on angle The access control model of color is broadly divided into four kinds:Basic model RBAC0, role hierarchy model RBAC1, role's limited model RBAC2 and unified model RBAC3;
Wherein, basic model RBAC0 includes four parts:User, role, session and license;Role hierarchy model RBAC1 is introduced Role succession, has reached the layering to role;Role's limited model RBAC2 introduces analysis of responsibility SSD and DSD, increases Role assignment AC, including mutually exclusive roles, constraint base and prerequisite constraint;Unified model RBAC3 combines RBAC1 and RBAC2 Introducing condition, reached unified model.
3. a kind of property estimation of enterprise method according to claim 1 or 2, which is characterized in that described according to company information Dynamic construction RBAC model, obtained by RBAC model include with the relevant permission proportion coefficients of role-security:
The construction RBAC model is unified model RBAC3, defines two kinds of macroscopical role categories:Static character and interim angle Color;For static character, it is relatively low that position will not adjust frequency, personal identification with the authority information update cycle relatively It is long;For temporary role, position can be changed with the adjustment and change of business, personal identification and authority information update cycle It is relatively short;
Dynamic RBAC Model is constructed using by institutional framework and business structure:Basic role is constructed by organizational information Tree;For basic role cultivating, the father node of its leaf node and leaf node is cropped, obtains static character tree;It fixes at this time The role that role cultivating is included is static character, to obtain static character set FR;According to the definition of static character, setting Primary cut obtains the period of static character tree as t_fixed;
After obtaining static character set FR, enterprise personnel set is set as S, to obtain temporary role set TR;
Using the business information of personnel in business structure dynamic lookup temporary role set TR, if temporary role is a certain business Responsible person searches with the same level traffic of department, and be considered as neighbor node, increases in static character tree according to business-level Respective nodes;Otherwise, by temporary role hook under corresponding static character node;By a node updates, RBAC is realized The dynamic construction of role cultivating namely the dynamic construction of RBAC model;
From the top down, rank distribution is presented in role cultivating;For enterprise, permission distribution is distributed close to Pareto, for enterprise Industry data find matching Pareto function, according to RBAC role cultivating height, corresponding authority value are obtained, so as to find out each The permission proportion coefficients of a role node:L1,L2,L3,…。
4. a kind of property estimation of enterprise method stated according to claim 1, which is characterized in that
According to RBAC role cultivating role node number n, initialization assets value base vector and intrinsic assets value vector;
Initializing assets value base vector is:X0=(1/n, 1/n, 1/n ...)T
Initializing intrinsic assets value vector is:IV=(1/n, 1/n, 1/n ...)T
Design assets value Transfer matrix:
D=[d11,d12,d13,…,d1n
d21,d22,d23,…,d2n
dn1,dn2,dn3,…,dnn]
Wherein, dij defines two role nodes of i, j with the presence or absence of assets transfer;
Permission proportion coefficients are α to the impact factor of assets, and assets are shifted with beta ratio in information exchanging process;
Design is following iterative, carries out assets value and transmits interative computation:
Xt+1=β DXt+(1-β)IV;
Wherein, t indicates iterations;
Judge the vectorial X after current iterationt+1With the vectorial X after last iterationtBetween difference whether be less than threshold value;If so, Then it is judged to restraining, into next step, permission factor transformation;Otherwise, continue iterative cycles;Final convergency value is denoted as XT
To convergency value XTThe transformation of claim proportion coefficients is done, X is obtainedresult
CN201810540944.6A 2018-05-30 2018-05-30 A kind of property estimation of enterprise method Pending CN108805432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810540944.6A CN108805432A (en) 2018-05-30 2018-05-30 A kind of property estimation of enterprise method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810540944.6A CN108805432A (en) 2018-05-30 2018-05-30 A kind of property estimation of enterprise method

Publications (1)

Publication Number Publication Date
CN108805432A true CN108805432A (en) 2018-11-13

Family

ID=64089379

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810540944.6A Pending CN108805432A (en) 2018-05-30 2018-05-30 A kind of property estimation of enterprise method

Country Status (1)

Country Link
CN (1) CN108805432A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995200A (en) * 2019-01-11 2021-06-18 深圳联合产权交易所股份有限公司 Resource value evaluation user management method based on cloud platform and related product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088679A (en) * 1997-12-01 2000-07-11 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
CN103778510A (en) * 2014-01-23 2014-05-07 北京荣之联科技股份有限公司 Task management method and device for quantifying task value
CN104156905A (en) * 2014-08-15 2014-11-19 西安交通大学 Taxpayer interest association network-based key monitored enterprise evaluation method
CN104767813A (en) * 2015-04-08 2015-07-08 江苏国盾科技实业有限责任公司 Public bank big data service platform based on openstack
CN104951903A (en) * 2015-07-08 2015-09-30 安徽兆尹信息科技有限责任公司 Custom asset evaluation method based on financial asset management system architecture
CN105488699A (en) * 2015-12-25 2016-04-13 国信优易数据有限公司 Data asset value assessment method
CN106991523A (en) * 2017-03-16 2017-07-28 国网江苏省电力公司扬州供电公司 The electric service value assessment method and system of customer-orientation

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088679A (en) * 1997-12-01 2000-07-11 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
CN103778510A (en) * 2014-01-23 2014-05-07 北京荣之联科技股份有限公司 Task management method and device for quantifying task value
CN104156905A (en) * 2014-08-15 2014-11-19 西安交通大学 Taxpayer interest association network-based key monitored enterprise evaluation method
CN104767813A (en) * 2015-04-08 2015-07-08 江苏国盾科技实业有限责任公司 Public bank big data service platform based on openstack
CN104951903A (en) * 2015-07-08 2015-09-30 安徽兆尹信息科技有限责任公司 Custom asset evaluation method based on financial asset management system architecture
CN105488699A (en) * 2015-12-25 2016-04-13 国信优易数据有限公司 Data asset value assessment method
CN106991523A (en) * 2017-03-16 2017-07-28 国网江苏省电力公司扬州供电公司 The electric service value assessment method and system of customer-orientation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王晓兰等: "基于角色的访问控制在房地产评估***中的应用研究", 《电子商务》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995200A (en) * 2019-01-11 2021-06-18 深圳联合产权交易所股份有限公司 Resource value evaluation user management method based on cloud platform and related product
CN112995201A (en) * 2019-01-11 2021-06-18 深圳联合产权交易所股份有限公司 Resource value evaluation processing method based on cloud platform and related device
CN112995201B (en) * 2019-01-11 2022-07-12 深圳联合产权交易所股份有限公司 Resource value evaluation processing method based on cloud platform and related device

Similar Documents

Publication Publication Date Title
Crane-Droesch Machine learning methods for crop yield prediction and climate change impact assessment in agriculture
Wardhana et al. Agro-clusters and rural poverty: a spatial perspective for West Java
Delignette-Muller et al. fitdistrplus: An R package for fitting distributions
Watson et al. Identifying critical regions in small-world marine metapopulations
Billionnet Mathematical optimization ideas for biodiversity conservation
Wilks Interannual variability and extreme-value characteristics of several stochastic daily precipitation models
Fisher et al. Assessing uncertainties in a second‐generation dynamic vegetation model caused by ecological scale limitations
Bickel et al. A nonparametric view of network models and Newman–Girvan and other modularities
Pillsbury et al. Another tool in the toolbox? Using fire and grazing to promote bird diversity in highly fragmented landscapes
Chatzopoulos et al. Adaptation and climate change impacts: a structural Ricardian analysis of farm types in Germany
Davendra et al. Complex network analysis of differential evolution algorithm applied to flowshop with no-wait problem
CN108804565B (en) Knowledge representation learning-based collaborative matrix decomposition method
CN109190053A (en) One kind being based on point of interest importance and the authoritative point of interest recommended method of user
Stufler Gibbs partitions: The convergent case
La Sala et al. Spatial modelling for low pathogenicity avian influenza virus at the interface of wild birds and backyard poultry
Nathan et al. A dynamic algorithm for updating katz centrality in graphs
Susca et al. Top eigenpair statistics for weighted sparse graphs
Toyonaga et al. A crop planning problem with fuzzy random profit coefficients
Letham et al. Bayesian inference of arrival rate and substitution behavior from sales transaction data with stockouts
CN108805432A (en) A kind of property estimation of enterprise method
Adhikari et al. Corona product of signed graphs and its application to modeling signed networks
Zhao et al. Identifying influential nodes based on graph signal processing in complex networks
Wootton et al. Species' traits and food‐web complexity interactively affect a food web's response to press disturbance
Pandey et al. Context dependent preferential attachment model for complex networks
Mortier et al. Mixture of inhomogeneous matrix models for species‐rich ecosystems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113

RJ01 Rejection of invention patent application after publication