{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T23:01:31Z","timestamp":1770073291744,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031577116","type":"print"},{"value":"9783031577123","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57712-3_6","type":"book-chapter","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:02:14Z","timestamp":1713463334000},"page":"81-96","source":"Crossref","is-referenced-by-count":1,"title":["Studies on\u00a0Multi-objective Role Mining in\u00a0ERP Systems"],"prefix":"10.1007","author":[{"given":"Simon","family":"Anderer","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Scheuermann","sequence":"additional","affiliation":[]},{"given":"Sanaz","family":"Mostaghim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"PwC, PwC\u2019s Global Economic Crime and Fraud Survey 2022. PricewaterhouseCoopers (2022)"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem. In: Proceedings of the 12th ACM SACMAT, Sophia Antipolis, France, 20\u201322 June 2007, pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S.: A simple role mining algorithm. In: Proceedings of the ACM SAC, Sierre, Switzerland, 22\u201326 March 2010, pp. 1958\u20131962 (2010)","DOI":"10.1145\/1774088.1774503"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-17714-9_13","volume-title":"Information Systems Security","author":"R Kumar","year":"2010","unstructured":"Kumar, R., Sural, S., Gupta, A.: Mining RBAC roles under cardinality constraint. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 171\u2013185. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17714-9_13"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Molloy, I.M., et al.: Evaluating role mining algorithms. In: Proceedings ACM SACMAT 2009, Stresa, Italia, 3\u20135 June 2009, pp. 95\u2013104 (2009)","DOI":"10.1145\/1542207.1542224"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Schlegelmilch, J., Steffens, U.: Role mining with ORCA. In: Proceedings ACM SACMAT 2005, pp. 168\u2013176. ACM Press, New York (2005)","DOI":"10.1145\/1063979.1064008"},{"issue":"3","key":"6_CR8","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TDSC.2008.61","volume":"7","author":"J Vaidya","year":"2010","unstructured":"Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset enumeration. IEEE Trans. Dependable Secure Comput. 7(3), 300\u2013314 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10878-013-9633-9","volume":"30","author":"H Huang","year":"2015","unstructured":"Huang, H., Shang, F., Liu, J., Du, H.: Handling least privilege problem and role mining in RBAC. J. Comb. Optim. 30(1), 63\u201386 (2015)","journal-title":"J. Comb. Optim."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Proceedings of the ACM Symposium on Access Control Models and Technologies - SACMAT 2008, pp. 1\u201310. ACM Press, New York (2008)","DOI":"10.1145\/1377836.1377838"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimisation. In: Proceedings of the ACM Symposium on Access Control Models and Technologies - SACMAT 2007, pp. 139\u2013144. ACM Press, New York (2007)","DOI":"10.1145\/1266840.1266862"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ramamohanarao, K., Versteeg, S., Zhang, R.: Graph based strategies to role engineering. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW 2010, pp. 1\u20134. ACM Press, New York (2010)","DOI":"10.1145\/1852666.1852694"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2871148","volume":"48","author":"B Mitra","year":"2016","unstructured":"Mitra, B., Sural, S., Vaidya, J., Atluri, V.: A survey of role mining. ACM Comput. Surv. 48(4), 1\u201337 (2016)","journal-title":"ACM Comput. Surv."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Genetic algorithms for role mining problem. In: Proceedings of the 19th PDP 2011, Ayia Napa, Cyprus, 9\u201311 February 2011, pp. 646\u2013650 (2011)","DOI":"10.1109\/PDP.2011.63"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Du, X., Chang, X.: Performance of AI algorithms for mining meaningful roles. In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2014, Beijing, China, 6\u201311 July 2014, pp. 2070\u20132076 (2014)","DOI":"10.1109\/CEC.2014.6900321"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Anderer, S., Kreppein, D., Scheuermann, B., Mostaghim, S.: The addRole-EA: a new evolutionary algorithm for the role mining problem. In: Proceedings of the 12th IJCCI 2020, Budapest, Hungary, 2\u20134 November 2020, pp. 155\u2013166 (2020)","DOI":"10.5220\/0010025401550166"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Anderer, S., Scheuermann, B., Mostaghim, S., Bauerle, P., Beil, M.: RMPlib: a library of benchmarks for the role mining problem. In: SACMAT 2021: Proceedings of the 26th ACM SACMAT, Virtual Event, Spain, 16\u201318 June 2021, pp. 3\u201313 (2021)","DOI":"10.1145\/3450569.3463566"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Anderer, S., Alpay, S., Scheuermann, B., Mostaghim, S.: On using authorization traces to support role mining with evolutionary algorithms. In: Proceedings of the 14th IJCCI 2022, Valletta, Malta, 24\u201326 October 2022, pp. 121\u2013132 (2022)","DOI":"10.5220\/0011539300003332"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Islam, A.K., et al.: Fraud detection in ERP systems using scenario matching. In: Security and Privacy - Silver Linings in the Cloud - Proceedings of the 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, 20\u201323 September 2010, vol. 330, pp. 112\u2013123 (2010)","DOI":"10.1007\/978-3-642-15257-3_11"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Using genetic algorithms for design and reconfiguration of RBAC schemes. In: Proceedings of the 1st International Workshop on AI for Privacy and Security, PrAISe@ECAI 2016, The Hague, Netherlands, 29\u201330 August 2016, pp. 1\u20139 (2016)","DOI":"10.1145\/2970030.2970033"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A.: A cost-driven approach to role engineering. In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, 16\u201320 March 2008, pp. 2129\u20132136 (2008)","DOI":"10.1145\/1363686.1364198"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Algorithms for mining meaningful roles. In: Proceedings of the 17th ACM SACMAT, Newark, NJ, USA, 20\u201322 June 2012, pp. 57\u201366 (2012)","DOI":"10.1145\/2295136.2295146"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Molloy, I.M., et al.: Mining roles with semantic meanings. In: Proceedings of the 13th ACM SACMAT, Estes Park, CO, USA, 11\u201313 June 2008, pp. 21\u201330 (2008)","DOI":"10.1145\/1377836.1377840"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Molloy, I.M., et al.: Mining roles with multiple objectives. ACM Trans. Inf. Syst. Secur. (TISSEC) 1\u201335 (2010)","DOI":"10.1145\/1880022.1880030"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Bui, T.: Mining hierarchical temporal roles with multiple metrics. J. Comput. Secur. 121\u2013142 (2018)","DOI":"10.3233\/JCS-17989"},{"issue":"2","key":"6_CR26","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Lecture Notes in Computer Science","Evolutionary Computation in Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57712-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T15:51:18Z","timestamp":1731772278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57712-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031577116","9783031577123"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57712-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}