{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:33:04Z","timestamp":1742995984788,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319229140"},{"type":"electronic","value":"9783319229157"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22915-7_17","type":"book-chapter","created":{"date-parts":[[2015,8,7]],"date-time":"2015-08-07T02:14:54Z","timestamp":1438913694000},"page":"176-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis"],"prefix":"10.1007","author":[{"given":"Chandra Mouliswaran","family":"Subramanian","sequence":"first","affiliation":[]},{"given":"Aswani Kumar","family":"Cherukuri","sequence":"additional","affiliation":[]},{"given":"Chandrasekar","family":"Chelliah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,8]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role based access control: towards a unified standard. In: Proceedings of the 5th ACM Workshop on Role Based Access Control, July 26\u201327, Berlin, pp. 47\u201363 (2000). Initial proposal for the current INCITS 359-2004 RBAC standard","key":"17_CR2","DOI":"10.1145\/344287.344301"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Richard Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"10","key":"17_CR4","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.ipl.2011.02.010","volume":"111","author":"C Mart\u00ednez-Garc\u00eda","year":"2011","unstructured":"Mart\u00ednez-Garc\u00eda, C., Navarro-Arribas, G., Borrell, J.: Fuzzy role-based access control. Inf. Process. Lett. 111(10), 483\u2013487 (2011)","journal-title":"Inf. Process. Lett."},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-540-74469-6_62","volume-title":"Database and Expert Systems Applications","author":"M Sassi","year":"2007","unstructured":"Sassi, M., Touzi, A.G., Ounelli, H.: Clustering quality evaluation based on fuzzy FCA. In: Wagner, R., Revell, N., Pernul, G. (eds.) DEXA 2007. LNCS, vol. 4653, pp. 639\u2013649. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Sarnovsky, M., Butka, P., Pocsova, J.: Cloud computing as a platform for distributed fuzzy FCA approach in data analysis. In: 16th IEEE International Conference on Intelligent Engineering Systems (INES), pp. 291\u2013296. IEEE (2012)","key":"17_CR6","DOI":"10.1109\/INES.2012.6249847"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-14197-3_15","volume-title":"Conceptual Structures: From Information to Intelligence","author":"J Poelmans","year":"2010","unstructured":"Poelmans, J., Elzinga, P., Viaene, S., Dedene, G.: Formal concept analysis in knowledge discovery: a survey. In: Croitoru, M., Ferr\u00e9, S., Lukose, D. (eds.) ICCS 2010. LNCS, vol. 6208, pp. 139\u2013153. Springer, Heidelberg (2010)"},{"unstructured":"Crampton, J.: Authorization and antichains. Ph.D. diss.: Birkbeck College (2002)","key":"17_CR8"},{"issue":"1\u20132","key":"17_CR9","first-page":"2","volume":"28","author":"AO Sergei","year":"2009","unstructured":"Sergei, A.O., Kourie, D.G., Eloff, J.H.P.: Building access control models with attribute exploration. Comput. Secur. 28(1\u20132), 2\u20137 (2009)","journal-title":"Comput. Secur."},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-03079-6_11","volume-title":"Conceptual Structures: Leveraging Semantic Technologies","author":"F Dau","year":"2009","unstructured":"Dau, F., Knechtel, M.: Access policy design supported by FCA methods. In: Rudolph, S., Dau, F., Kuznetsov, S.O. (eds.) ICCS 2009. LNCS, vol. 5662, pp. 141\u2013154. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Takabi, H., Amini, M., Jalili, R.: Enhancing role-based access control model through fuzzy relations. In: Third International Symposium on Information Assurance and Security, IAS 2007, pp. 131\u2013136. IEEE (2007)","key":"17_CR11","DOI":"10.1109\/ISIAS.2007.4299763"},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 191\u2013233 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V.: dRBAC: distributed role-based access control for dynamic coalition environments. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 411\u2013420. IEEE (2002)","key":"17_CR13","DOI":"10.21236\/ADA440599"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/3-540-44469-6_25","volume-title":"Database and Expert Systems Applications","author":"S Oh","year":"2000","unstructured":"Oh, S., Park, S.: Task-role based access control (T-RBAC): an improved access control model for enterprise environment. In: Ibrahim, M., K\u00fcng, J., Revell, N. (eds.) DEXA 2000. LNCS, vol. 1873, p. 264. Springer, Heidelberg (2000)"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.comnet.2012.09.018","volume":"57","author":"D Unal","year":"2013","unstructured":"Unal, D., Caglayan, M.U.: A formal role-based access control model for security policies in multi-domain mobile networks. Comput. Netw. 57, 330\u2013350 (2013)","journal-title":"Comput. Netw."},{"unstructured":"Baracaldo, N., Maasoumzadeh, A., Joshi, J.: A secure constriant aware role based access conrol interoperation framework. IEEE (2011). 978-1-4577-0460-4\/11","key":"17_CR16"},{"unstructured":"Kumar, M., Newman, R.E.: STRBAC - an approach towards spatio-temporal role-based access control. In: Proceedings of the 3rd IASTED International Conference on Communication, Network, and Information Security, pp. 150\u2013 155 (2006)","key":"17_CR17"},{"issue":"8","key":"17_CR18","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.jcss.2014.04.019","volume":"80","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80(8), 1518\u20131533 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.is.2015.01.007","volume":"53","author":"B Lee","year":"2015","unstructured":"Lee, B., Kim, D.-K., Yang, H., Jang, H.: Role-based access control for substation automation systems using XACML. Inf. Syst. 53, 237\u2013249 (2015)","journal-title":"Inf. Syst."},{"issue":"3","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1805974.1805980","volume":"13","author":"Q Ni","year":"2010","unstructured":"Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.-M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 1\u201331 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Martino, L.D., Ni, Q., Lin, D., Bertino, E.: Multi-domain and privacy-aware role based access control in eHealth. In: Second International Conference on Pervasive Computing Technologies for Healthcare, Pervasive Health 2008, pp. 131\u2013134. IEEE (2008)","key":"17_CR21","DOI":"10.1109\/PCTHEALTH.2008.4571050"},{"doi-asserted-by":"crossref","unstructured":"Takabi, H., Amini, M., Jalili, R.: Separation of duty in role-based access control model through fuzzy relations. In: Third International Symposium on Information Assurance and Security, IAS 2007, pp. 125\u2013130. IEEE (2007)","key":"17_CR22","DOI":"10.1109\/ISIAS.2007.4299762"},{"unstructured":"Nawarathna, U.H.G.R.D., Kodithuwakku, S.R.: A fuzzy role based access control model for database security. In: Proceedings of the International Conference on Information and Automation, pp. 313\u2013318 (2005)","key":"17_CR23"},{"doi-asserted-by":"crossref","unstructured":"Wang, C., Liu, S.: Study on fuzzy theory based web access control model. In: International Symposiums on Information Processing (ISIP) 2008, pp. 178\u2013182. IEEE (2008)","key":"17_CR24","DOI":"10.1109\/ISIP.2008.43"},{"unstructured":"Knechtel, M.: Access restrictions to and with description logic web ontologies, pp. 1\u2013139. Dresden University of Technology (2010)","key":"17_CR25"},{"issue":"3","key":"17_CR26","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1002\/sec.589","volume":"6","author":"Ch Aswani Kumar","year":"2013","unstructured":"Aswani Kumar, Ch.: Designing role-based access control using formal concept analysis. Secur. Commun. Netw. 6(3), 373\u2013383 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"17_CR27","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1080\/08839514.2012.648457","volume":"26","author":"Ch Aswani Kumar","year":"2012","unstructured":"Aswani Kumar, Ch.: Fuzzy clustering-based formal concept analysis for association rules mining. Applied artificial intelligence 26(3), 274\u2013301 (2012)","journal-title":"Applied artificial intelligence"},{"doi-asserted-by":"crossref","unstructured":"Mouliswaran, S.C., Aswani Kumar, C., Chandrasekar, C.: Modeling Chinese wall access control using formal concept analysis. In: International Conference on Contemporary Computing and Informatics (IC3I), pp. 811\u2013816. IEEE (2014)","key":"17_CR28","DOI":"10.1109\/IC3I.2014.7019619"},{"doi-asserted-by":"publisher","unstructured":"Singh, P.K., Aswani Kumar, C., Li, J.: Knowledge representation using interval-valued fuzzy formal concept lattice. Soft Comput., 1\u201318 (2015). doi:10.1007\/s00500-015-1600-1","key":"17_CR29","DOI":"10.1007\/s00500-015-1600-1"},{"issue":"1","key":"17_CR30","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1002\/int.21576","volume":"28","author":"T Martin","year":"2013","unstructured":"Martin, T., Majidian, A.: Finding fuzzy concepts for creative knowledge discovery. Int. J. Intell. Syst. 28(1), 93\u2013114 (2013)","journal-title":"Int. J. Intell. Syst."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22915-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T06:24:25Z","timestamp":1676960665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22915-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319229140","9783319229157"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22915-7_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"8 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}