[1] Sandhu R, Coyne E. Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47. [2] Zhang Yue, Joshi J B D. A scoped administration model for RBAC with hybrid hierarchy [J]. Journal of Information Assurance and Security, 2008, 2: 128-139. [3] Crampton J, Loizou G. Administrative scope: a foundation for role-based administrative models [J]. ACM Transactions on Information and System Security, 2003, 6(2): 201-231. [4] Sejong Oh, Sandhu R. An effective role administration model using organization structure [J]. ACM Transactions on Information and System Security, 2006, 9(2): 113-137. [5] 钟华, 冯玉琳, 姜洪安. 扩充角色层次关系模型及其应用[J]. 软件学报, 2000, 11(6): 779-784. Zhong Hua, Feng Yulin, Jiang Hongan. Role hierarchy model for role-based access control and its application [J]. Journal of Software, 2000, 11(6): 779-784. [6] An Y A, Hu X H, Song I Y. Maintaining mappings between conceptual models and relational schemas [J]. Journal of Database Management, 2010, 21(3): 36-68. (上接第18页) [2] Xu X, Sahni S. Approximation algorithms for sensor deployment[J]. IEEE Transactions on Mobile Computing, 2007, 56(12): 1681-1695. [3] Lin F Y S, Chiu P L. A near-optimal sensor placement algorithm to achieve complete coverage/discrimination in sensor networks[J]. IEEE Comm Letters, 2005, 9(1): 43-45. [4] 刘巍, 崔莉. 基于蚁群算法的传感器网络节点部署设计[J]. 通信学报, 2009, 30(10): 24-33. Liu Wei, Cui Li. Ant based approach to the optimal deployment in wireless sensor networks[J]. Journal of Communication, 2009, 30(10): 24-33. [5] Jourdan B, Weck O L. Layout optimization for a wireless sensor network using a multi-objective genetic algorithm//Proceeding of IEEE Vehicular Technology Conference. Los Angeles: IEEE Press, 2004: 2466-2470. [6] 何欣, 桂小林, 安健. 面向目标覆盖的无线传感器网络确定性部署方法[J]. 西安交通大学学报, 2010, 44(6): 6-10. He Xin, Gui Xiaolin, An Jian. A deterministic deployment approach of nodes in wireless sensor networks for target coverage[J]. Journal of Xian Jiaotong University, 2010, 44(6): 6-10. [7] Xu Y, Yao X. A GA approach to the optimal placement of sensors in wireless sensor networks with obstacles and preferences//Proceedings of IEEE Conference on Consumer Communications and Networking (CCNC). Las Vegas: IEEE Press, 2006: 127-131. [8] Hochbaum D S. Approximation algorithms for the set covering and vertex cover problems[J]. SIAM Journal on Computing, 1982, 11(3): 555-556. |