{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:19:37Z","timestamp":1742401177886,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_22","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"333-347","source":"Crossref","is-referenced-by-count":15,"title":["Leveraging Lattices to Improve Role Mining"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Colantonio","sequence":"first","affiliation":[]},{"given":"Roberto Di","family":"Pietro","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Ocello","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: J.B. Bocca, M. Jarke, C. Zaniolo (eds.) Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, pp. 487\u2013499. Morgan Kaufmann (1994)"},{"issue":"2","key":"22_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1137\/0201008","volume":"1","author":"A.V. Aho","year":"1972","unstructured":"Aho, A.V., Garey, M.R., Ullman, J.D.: The transitive reduction of a directed graph. SIAM Journal on Computing 1(2), 131\u2013137 (1972)","journal-title":"SIAM Journal on Computing"},{"key":"22_CR3","unstructured":"ANSI\/INCITS 359-2004, Information Technology \u2013 Role Based Access Control (2004)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A.: A cost-driven approach to role engineering. In: Proceedings of the 23rd ACM Symposium on Applied Computing, SAC \u201808, pp. 2129\u20132136. Fortaleza, Cear\u00e1, Brazil (2008)","DOI":"10.1145\/1363686.1364198"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Coyne, E.J.: Role-engineering. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, RBAC \u201895 (1995)","DOI":"10.1145\/270152.270159"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Davey, B.A., Priestley, H.A.: Introduction to Lattices and Order, 2 edn. Cambridge University Press (2002)","DOI":"10.1017\/CBO9780511809088"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Epstein, P., Sandhu, R.: Engineering of role\/permission assignments. In: Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC, pp. 127\u2013136. IEEE Computer Society (2001)","DOI":"10.1109\/ACSAC.2001.991529"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Kern, A., Kuhlmann, M., Schaad, A., Moffett, J.: Observations on the role life-cycle in the context of enterprise security management. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, SACMAT \u201802 (2002)","DOI":"10.1145\/507711.507718"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining - revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, SACMAT \u201803, pp. 179\u2013186 (2003)","DOI":"10.1145\/775433.775435"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Neumann, G., Strembeck, M.: A scenario-driven role engineering process for functional RBAC roles. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, SACMAT \u201802 (2002)","DOI":"10.1145\/507711.507717"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"R\u00f6ckle, H.: Role-finding\/role-engineering. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, RBAC 2000, p. 68 (2000)","DOI":"10.1145\/344287.344303"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"R\u00f6ckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, RBAC 2000, vol. 3 (2000)","DOI":"10.1145\/344287.344308"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Schlegelmilch, J., Steffens, U.: Role mining with ORCA. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, SACMAT \u201805, pp. 168\u2013176 (2005)","DOI":"10.1145\/1063979.1064008"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT \u201807, pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Warner, J.: RoleMiner: mining roles using subset enumeration. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)","DOI":"10.1145\/1180405.1180424"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimisation. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT \u201807, pp. 139\u2013144 (2007)","DOI":"10.1145\/1266840.1266862"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T01:31:28Z","timestamp":1738287088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_22","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}