{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T12:10:28Z","timestamp":1743336628946,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031868481","type":"print"},{"value":"9783031868498","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86849-8_3","type":"book-chapter","created":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T11:45:13Z","timestamp":1743335113000},"page":"33-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Studies on\u00a0Survival Strategies to\u00a0Protect Expert Knowledge in\u00a0Evolutionary Algorithms for\u00a0Interactive Role Mining"],"prefix":"10.1007","author":[{"given":"Simon","family":"Anderer","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Justen","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Scheuermann","sequence":"additional","affiliation":[]},{"given":"Sanaz","family":"Mostaghim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,18]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Anderer, S., Justen, N., Scheuermann, B., Mostaghim, S.: Interactive role mining including expert knowledge into evolutionary algorithms. In: Proceedings of the 15th International Joint Conference on Computational Intelligence - ECTA, pp. 151\u2013162. INSTICC, SciTePress (2023). https:\/\/doi.org\/10.5220\/0012153000003595","DOI":"10.5220\/0012153000003595"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Anderer, S., Justen, N., Scheuermann, B., Mostaghim, S.: Survival strategies for evolutionary role mining algorithms using expert knowledge. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO 2024, pp. 623\u2013626. Companion, Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3638530.3654183","DOI":"10.1145\/3638530.3654183"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Anderer, S., Kempter, T., Scheuermann, B., Mostaghim, S.: The dynamic role mining problem: role mining in dynamically changing business environments. In: B\u00e4ck, T., Wagner, C., Garibaldi, J.M., Lam, H.K., Cottrell, M., Merelo, J.J., Warwick, K. (eds.) Proceedings of the 13th International Joint Conference on Computational Intelligence, IJCCI 2021, Online Streaming, 25\u201327 October 2021, pp. 37\u201348. SCITEPRESS (2021)","DOI":"10.5220\/0010654000003063"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Anderer, S., Kreppein, D., Scheuermann, B., Mostaghim, S.: The addrole-EA: a new evolutionary algorithm for the role mining problem. In: Guerv\u00f3s, J.J.M., Garibaldi, J.M., Wagner, C., B\u00e4ck, T., Madani, K., Warwick, K. (eds.) Proceedings of the 12th International Joint Conference on Computational Intelligence, IJCCI 2020, Budapest, Hungary, 2\u20134 November 2020, pp. 155\u2013166. SCITEPRESS (2020)","DOI":"10.5220\/0010025401550166"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Anderer, S., Scheuermann, B., Mostaghim, S., Bauerle, P., Beil, M.: Rmplib: a library of benchmarks for the role mining problem. In: Lobo, J., Pietro, R.D., Chowdhury, O., Hu, H. (eds.) SACMAT 2021: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, 16\u201318 June 2021, pp. 3\u201313. ACM (2021)","DOI":"10.1145\/3450569.3463566"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S.: A simple role mining algorithm. In: Shin, S.Y., Ossowski, S., Schumacher, M., Palakal, M.J., Hung, C.C. (eds.) Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, 22\u201326 March 2010, pp. 1958\u20131962. ACM, New York (2010)","DOI":"10.1145\/1774088.1774503"},{"issue":"5","key":"3_CR7","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1080\/0305215X.2012.685074","volume":"45","author":"K Deb","year":"2013","unstructured":"Deb, K., Datta, R.: A bi-objective constrained optimization algorithm using a hybrid evolutionary and penalty function approach. Eng. Optim. 45(5), 503\u2013527 (2013)","journal-title":"Eng. Optim."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Du, X., Chang, X.: Performance of AI algorithms for mining meaningful roles. In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2014, Beijing, China, 6\u201311 July 2014, pp. 2070\u20132076. IEEE (2014)","DOI":"10.1109\/CEC.2014.6900321"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Ene, A., Horne, W.G., Milosavljevic, N., Rao, P., Schrei-ber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Ray, I., Li, N. (eds.) Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, 11\u201313 June 2008, pp. 1\u201310. ACM, New York (2008)","DOI":"10.1145\/1377836.1377838"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Hu, Y.B., Wang, Y.P., Guo, F.Y.: A new penalty based genetic algorithm for constrained optimization problems. In: 2005 International Conference on Machine Learning and Cybernetics, vol.\u00a05, pp. 3025\u20133029. IEEE (2005)","DOI":"10.1109\/ICMLC.2005.1527461"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Huang, H., Shang, F., Liu, J., Du, H.: Handling least privilege problem and role mining in RBAC. J. Comb. Optim. 30, 63\u201386 (2015)","DOI":"10.1007\/s10878-013-9633-9"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1016\/j.asoc.2011.11.005","volume":"12","author":"J Karimi","year":"2012","unstructured":"Karimi, J., Nobahari, H., Pourtakdoust, S.H.: A new hybrid approach for dynamic continuous optimization problems. Appl. Soft Comput. 12, 1158\u20131167 (2012)","journal-title":"Appl. Soft Comput."},{"key":"3_CR13","unstructured":"Knecht, K.: Grundriss-generierung mit k-dimensionalen baumstruktur-en. In: Donath, D., K\u00f6nig, R. (eds.) Arbeitspapiere Nr. 9 Informatik in der Architektur. Bauhaus-Universit\u00e4t Weimar, Professur Informatik in der Architektur, Weimar (2011)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Mitra, B., Sural, S., Vaidya, J., Atluri, V.: A survey of role mining. ACM Comput. Surv. 48, 1\u201337 (2016)","DOI":"10.1145\/2871148"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Molloy, I.M., Li, N., Li, T., Mao, Z., Wang, Q., Lobo, J.: Evaluating role mining algorithms. In: Carminati, B., Joshi, J. (eds.) 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, 3\u20135 June 2009, Proceedings, pp. 95\u2013104. ACM, New York (2009)","DOI":"10.1145\/1542207.1542224"},{"key":"3_CR16","unstructured":"PwC: PwC\u2019s Global Economic Crime and Fraud Survey 2022. Pricewaterhouse-Coopers (2022)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Genetic algorithms for role mining problem. In: Cotronis, Y., Danelutto, M., Papadopoulos, G.A. (eds.) Proceedings of the 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2011, Ayia Napa, Cyprus, 9\u201311 February 2011, pp. 646\u2013650. IEEE, New York (2011)","DOI":"10.1109\/PDP.2011.63"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Design and performance evaluation of improved genetic algorithm for role mining problem. In: Stotzka, R., Schiffers, M., Cotronis, Y. (eds.) Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012, Munich, Germany, 15\u201317 February 2012, pp. 269\u2013274. IEEE, New York (2012)","DOI":"10.1109\/PDP.2012.31"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Using genetic algorithms for design and reconfiguration of RBAC schemes. In: Proceedings of the 1st International Workshop on AI for Privacy and Security, PrAISe@ECAI 2016, The Hague, Netherlands, 29\u201330 August 2016, pp.\u00a01\u20139. ACM, New York (2016)","DOI":"10.1145\/2970030.2970033"},{"key":"3_CR20","unstructured":"Schaffer, J.D.: Multiple objective optimization with vector evaluated genetic algorithms. In: Grefenstette, J.J. (ed.) Proceedings of the 1st International Conference on Genetic Algorithms, Pittsburgh, PA, USA, July 1985, pp. 93\u2013100. L. Erlbaum Associates, Hillsdale, New Jersey (1985)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem. In: Lotz, V., Thuraisingham, B. (eds.) Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, 20\u201322 June 2007, pp. 175\u2013184. ACM, New York (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"3_CR22","unstructured":"Vaidya, J., Atluri, V., Guo, Q., Lu, H.: Role mining in the presence of noise. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV - Proceedings of the 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, 21\u201323 June 2010. Lecture Notes in Computer Science, vol.\u00a06166, pp. 97\u2013112. Springer, Heidelberg (2010)"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TDSC.2008.61","volume":"7","author":"J Vaidya","year":"2010","unstructured":"Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset enumeration. IEEE Trans. Dependable Secure Comput. 7, 300\u2013314 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Volkovas, R., Fairbank, M., Perez-Liebana, D.: Diversity maintenance using a population of repelling random-mutation hill climbers. In: 2017 9th Computer Science and Electronic Engineering (CEEC), pp. 37\u201342. IEEE (2017)","DOI":"10.1109\/CEEC.2017.8101596"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wineberg, M.: Estimation of evolvability genetic algorithm and dynamic environments. In: Genetic Programming and Evolvable Machines, vol.\u00a07, pp. 355\u2013382. Springer, Heidelberg (2006)","DOI":"10.1007\/s10710-006-9015-5"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, W., Zhang, M., Zhang, W., Meng, Y., Wu, H.G.: Innate-adaptive response and memory based artificial immune system for dynamic optimization. Int. J. Performability Eng. 14, 2048\u20132055 (2018)","DOI":"10.23940\/ijpe.18.09.p13.20482055"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, W., Alam, S., Abbass, H.A.: Mocca-II: a multi-objective co-operative co-evolutionary algorithm. Appl. Soft Comput. 23, 407\u2013416 (2014)","DOI":"10.1016\/j.asoc.2014.06.011"}],"container-title":["Lecture Notes in Computer Science","Evolutionary Computation in Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86849-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T11:45:23Z","timestamp":1743335123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86849-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031868481","9783031868498"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86849-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"EvoCOP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Evolutionary Computation in Combinatorial Optimization (Part of EvoStar)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trieste","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evocop2025a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.evostar.org\/2025\/evocop\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}