{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:43:18Z","timestamp":1725813798287},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138404"},{"type":"electronic","value":"9783319138411"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13841-1_7","type":"book-chapter","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T08:02:35Z","timestamp":1417593755000},"page":"109-128","source":"Crossref","is-referenced-by-count":2,"title":["Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC"],"prefix":"10.1007","author":[{"given":"Arindam","family":"Roy","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Majumdar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bell, D.E., Lapadula, L.J.: Secure computer system: Unified exposition and multics interpretation. Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01731 (1976)","DOI":"10.21236\/ADA023588"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Chen, F., Sandhu, R.S.: Constraints for role-based access control. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, pp. 39\u201346 (1996)","DOI":"10.1145\/270152.270177"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184\u2013194 (1987)","DOI":"10.1109\/SP.1987.10001"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Transactions on Information and System Security, 16(1), 4:1\u20134:31 (2013)","DOI":"10.1145\/2487222.2487226"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Diestel, R.: Graph Theory. Springer (2005)","DOI":"10.1007\/978-3-642-14279-6_7"},{"key":"7_CR7","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House (2007)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Frank, M., Buhman, J.M., Basin, D.: Role mining with probabilistic models. ACM Transactions on Information and System Security, 15(4), 15:1\u201315:28 (2013)","DOI":"10.1145\/2445566.2445567"},{"key":"7_CR9","unstructured":"Garey, M.R., Johnson, D.S.: Computers and intractability: A guide to the theory of np-completeness. W. H. Freeman (1979)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Harika, P., Nagajyothi, M., John, J.C., Sural, S., Vaidya, J., Atluri, V.: Meeting cardinality constraints in role mining. IEEE Transactions on Dependable and Secure Computing (to appear, 2014)","DOI":"10.1109\/TDSC.2014.2309117"},{"issue":"8","key":"7_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"Data and Applications Security and Privacy XXVI","author":"X. Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 41\u201355. Springer, Heidelberg (2012)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Kuhn, D.R.: Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In: Proceedings of the Second ACM Workshop on Role-based Access Control, pp. 23\u201330 (1997)","DOI":"10.1145\/266741.266749"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1237500.1237501","volume":"10","author":"N. Li","year":"2007","unstructured":"Li, N., Tripunitara, M.V., Bizri, Z.: On mutually exclusive roles and separation-of-duty. ACM Transactions on Information and System Security\u00a010(2), 1\u201336 (2007)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Roy, A., Sural, S., Majumdar, A.K.: Minimum user requirement in role based access control with separation of duty constraints. In: 12th International Conference on Intelligent Systems Design and Applications, pp. 386\u2013391 (2012)","DOI":"10.1109\/ISDA.2012.6416569"},{"issue":"1","key":"7_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R.S. Sandhu","year":"1999","unstructured":"Sandhu, R.S., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security (TISSEC)\u00a02(1), 105\u2013135 (1999)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Schaad, A., Moffett, J., Jacob, J.: The role-based access control system of a European bank: a case study and discussion. In: Proceedings of the sixth ACM Symposium on Access Control Models and Technologies, pp. 3\u20139 (2001)","DOI":"10.1145\/373256.373257"},{"key":"7_CR19","unstructured":"Scheinerman, E.R.: Matgraph: A MATLAB Toolbox for Graph Theory (2012), \n                      \n                        http:\/\/www.ams.jhu.edu\/~ers\/matgraph"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Transactions on Information and System Security 13(4), 40:1\u201340:35 (2010)","DOI":"10.1145\/1880022.1880034"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13841-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T19:17:07Z","timestamp":1559071027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13841-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138404","9783319138411"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13841-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}