{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:49:49Z","timestamp":1764841789542,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159331"},{"type":"electronic","value":"9783319159348"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15934-8_24","type":"book-chapter","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T08:14:50Z","timestamp":1426580090000},"page":"351-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Evolutionary Inference of Attribute-Based Access Control Policies"],"prefix":"10.1007","author":[{"given":"Eric","family":"Medvet","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Bartoli","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,18]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Ferrari, E.: Access Control in Data Management Systems. Synthesis Lectures on Data Management. Morgan & Claypool Publishers (2010)","DOI":"10.1007\/978-3-031-01836-7"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfo, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (SP) 800-162, Guide, October 2014","DOI":"10.6028\/NIST.SP.800-162"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 197\u2013206. ACM (2009)","DOI":"10.1145\/1542207.1542239"},{"issue":"3","key":"24_CR4","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TDSC.2013.11","volume":"10","author":"B Carminati","year":"2013","unstructured":"Carminati, B., Ferrari, E., Guglielmi, M.: A System for Timely and Controlled Information Sharing in Emergency Situations. IEEE Transactions on Dependable and Secure Computing 10(3), 129\u2013142 (2013)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies. arXiv preprint arXiv:1306.2401 (2013)","DOI":"10.1007\/978-3-662-43936-4_18"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies from RBAC policies. In: 2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/CEWIT.2013.6713753"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-22890-2_11","volume-title":"Trust, Privacy and Security in Digital Business","author":"N Gal-Oz","year":"2011","unstructured":"Gal-Oz, N., Gonen, Y., Yahalom, R., Gudes, E., Rozenberg, B., Shmueli, E.: Mining roles from web application usage patterns. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 125\u2013137. Springer, Heidelberg (2011)"},{"issue":"4","key":"24_CR8","doi-asserted-by":"publisher","first-page":"36:1","DOI":"10.1145\/1880022.1880030","volume":"13","author":"I Molloy","year":"2010","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., Lobo, J.: Mining roles with multiple objectives. ACM Trans. Inf. Syst. Secur. 13(4), 36:1\u201336:35 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Ni, Q., Lobo, J., Calo, S., Rohatgi, P., Bertino, E.: Automating role-based provisioning by learning from examples. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 75\u201384. ACM (2009)","DOI":"10.1145\/1542207.1542222"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Hu, N., Bradford, P.G., Liu, J.: Applying role based access control and genetic algorithms to insider threat detection. In: Proceedings of the 44th Annual Southeast Regional Conference, pp. 790\u2013791. ACM (2006)","DOI":"10.1145\/1185448.1185638"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Lim, Y.T., Cheng, P.C., Rohatgi, P., Clark, J.A.: MLS security policy evolution with genetic programming. In: Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation, pp. 1571\u20131578. ACM (2008)","DOI":"10.1145\/1389095.1389395"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Lim, Y.T., Cheng, P.C., Rohatgi, P., Clark, J.A.: Dynamic security policy learning. In: Proceedings of the First ACM Workshop on Information Security Governance, pp. 39\u201348. ACM (2009)","DOI":"10.1145\/1655168.1655177"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Bleuler, S., Brack, M., Thiele, L., Zitzler, E.: Multiobjective genetic programming: reducing bloat using SPEA2. In: Proceedings of the 2001 Congress on Evolutionary Computation, vol. 1, pp. 536\u2013543. IEEE (2001)","DOI":"10.1109\/CEC.2001.934438"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Tapiador, J.E., Clark, J.A.: Learning autonomic security reconfiguration policies. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 902\u2013909. IEEE (2010)","DOI":"10.1109\/CIT.2010.168"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/978-3-319-10762-2_39","volume-title":"Parallel Problem Solving from Nature \u2013 PPSN XIII","author":"A Bartoli","year":"2014","unstructured":"Bartoli, A., Cumar, S., De Lorenzo, A., Medvet, E.: Compressing regular expression sets for deep packet inspection. In: Bartz-Beielstein, T., Branke, J., Filipi\u010d, B., Smith, J. (eds.) PPSN XIII 2014. LNCS, vol. 8672, pp. 394\u2013403. Springer, Heidelberg (2014)"},{"issue":"1","key":"24_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1023\/A:1006524209794","volume":"13","author":"J F\u00fcrnkranz","year":"1999","unstructured":"F\u00fcrnkranz, J.: Separate-and-conquer rule learning. Artificial Intelligence Review 13(1), 3\u201354 (1999)","journal-title":"Artificial Intelligence Review"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Eggermont, J., Kok, J.N., Kosters, W.A.: Genetic programming for data classification: partitioning the search space. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 1001\u20131005. ACM (2004)","DOI":"10.1145\/967900.968104"}],"container-title":["Lecture Notes in Computer Science","Evolutionary Multi-Criterion Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15934-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T01:05:28Z","timestamp":1747789528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15934-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159331","9783319159348"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15934-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"18 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}