{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:22:16Z","timestamp":1743121336625,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_7","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"98-117","source":"Crossref","is-referenced-by-count":4,"title":["Role Mining in the Presence of Separation of Duty Constraints"],"prefix":"10.1007","author":[{"given":"Prasuna","family":"Sarana","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Comput. 29, 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Richard Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. In: ACM TISSEC, pp. 224\u2013274 (2001)","DOI":"10.1145\/501978.501980"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, D., Kotagiri, R., Tim, E.: Role engineering using graph optimization. In: ACM SACMAT, pp. 139\u2013144 (2007)","DOI":"10.1145\/1266840.1266862"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: ACM SACMAT, pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Lu, H., Vaidya, J., Atluri, V.: Optimal boolean matrix decomposition: application to role engineering. In: IEEE ICDE, pp. 297\u2013306 (2008)","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"7_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-30436-1_13","volume-title":"Information Security and Privacy Research","author":"JC John","year":"2012","unstructured":"John, J.C., Sural, S., Atluri, V., Vaidya, J.S.: Role mining under role-usage cardinality constraint. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 150\u2013161. Springer, Heidelberg (2012)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Tripunitara, M.V., Bizri, Z.: On mutually exclusive roles and separation of duty. In: ACM TISSEC, pp. 5\u201339 (2007)","DOI":"10.1145\/1237500.1237501"},{"key":"7_CR8","unstructured":"Alina, E., William, H., Nikola, M., Prasad, R., Robert, S., Robert, T.E.: Fast exact and heuristic methods for role minimization problems. In: ACM SACMAT, pp. 1\u201310 (2008)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-17714-9_13","volume-title":"Information Systems Security","author":"R Kumar","year":"2010","unstructured":"Kumar, R., Sural, S., Gupta, A.: Mining RBAC roles under cardinality constraint. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 171\u2013185. Springer, Heidelberg (2010)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Warner, J.: Role miner: mining roles using subset enumeration. In: ACM CCS, pp. 144\u2013153 (2006)","DOI":"10.1145\/1180405.1180424"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Lu, H., Vaidya, J., Atluri, V., Hong, Y.: Constraint-aware role mining via extended boolean matrix decomposition. In: IEEE TDSC, pp. 655\u2013669 (2012)","DOI":"10.1109\/TDSC.2012.21"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Coyne, E.J.: Role engineering. In: ACM Workshop on RBAC, pp. 15\u201316 (1996)","DOI":"10.1145\/270152.270159"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S.B., Lobo, J.: Mining roles with multiple objectives. In: ACM TISSEC, pp. 1\u201335 (2010)","DOI":"10.1145\/1880022.1880030"},{"issue":"1","key":"7_CR14","first-page":"71","volume":"12","author":"P Harika","year":"2015","unstructured":"Harika, P., Nagajyothi, M., John, J.C., Sural, S., Vaidya, J., Atluri, V.: Meeting cardinality constraints in role mining. IEEE TDSC 12(1), 71\u201384 (2015)","journal-title":"IEEE TDSC"},{"key":"7_CR15","unstructured":"Ye, W., Li, R., Gu, X., Li, Y., Wen, K.: Role mining using answer set programming. In: FGCS (2014)"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Li, R., Li, H., Gu, X., Li, Y., Ye, W., Ma, X.: Role mining based on cardinality constraints. In: Concurrency and Computation Practice and Experience (2015). doi:\n                      10.1002\/cpe.3456","DOI":"10.1002\/cpe.3456"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Ma, X., Li, R., Wang, H., Li, H.: Role mining based on permission cardinality constraint and user cardinality constraint. In: Security and Communication Networks (2014). doi:\n                      10.1002\/sec.1177","DOI":"10.1002\/sec.1177"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:03:44Z","timestamp":1559333024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}