{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:43:36Z","timestamp":1761597816160,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596464"},{"type":"electronic","value":"9783319596471"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59647-1_7","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T02:53:30Z","timestamp":1494644010000},"page":"86-100","source":"Crossref","is-referenced-by-count":8,"title":["ABAC Rule Reduction via Similarity Computation"],"prefix":"10.1007","author":[{"given":"Maryem","family":"Ait El Hadj","sequence":"first","affiliation":[]},{"given":"Yahya","family":"Benkaouz","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Freisleben","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Erradi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.A., Sandhu, R.: Induced role hierarchies with attribute-based RBAC. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 142\u2013148. ACM (2003)","DOI":"10.1145\/775412.775430"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Amato, G., Falchi, F.: kNN based image classification relying on local feature similarity. In: Proceedings of the Third International Conference on SImilarity Search and APplications, pp. 101\u2013108. ACM (2010)","DOI":"10.1145\/1862344.1862360"},{"key":"7_CR3","unstructured":"Balana: Open source xacml 3.0 implementation (2012). http:\/\/xacmlinfo.org\/2012\/08\/16\/balana-the-open-source-xacml-3-0-implementation\/"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Benkaouz, Y., Erradi, M., Freisleben, B.: Work in progress: K-nearest neighbors techniques for ABAC policies clustering. In: Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, pp. 72\u201375. ACM (2016)","DOI":"10.1145\/2875491.2875497"},{"key":"7_CR5","unstructured":"Bhatia, N., et al.: Survey of nearest neighbor techniques. arXiv preprint arXiv:1007.0085 (2010)"},{"issue":"1","key":"7_CR6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","volume":"18","author":"R Bhatti","year":"2005","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases 18(1), 83\u2013105 (2005)","journal-title":"Distrib. Parallel Databases"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 1\u201310. ACM (2008)","DOI":"10.1145\/1377836.1377838"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1007\/978-3-540-39964-3_62","volume-title":"On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE","author":"G Guo","year":"2003","unstructured":"Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K.: KNN model-based approach in classification. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) OTM 2003. LNCS, vol. 2888, pp. 986\u2013996. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-39964-3_62"},{"key":"7_CR9","unstructured":"Guo, S.: Analysis and evaluation of similarity metrics in collaborative filtering recommender system. Master\u2019s thesis. Lapland University of Applied Sciences (2014)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, D.R.: Assessment of access control systems. US Department of Commerce, National Institute of Standards and Technology (2006)","DOI":"10.6028\/NIST.IR.7316"},{"issue":"9","key":"7_CR11","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1109\/TKDE.2012.174","volume":"25","author":"D Lin","year":"2013","unstructured":"Lin, D., Rao, P., Ferrini, R., Bertino, E., Lobo, J.: A similarity measure for comparing XACML policies. IEEE Trans. Knowl. Data Eng. 25(9), 1946\u20131959 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"7_CR12","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., Lobo, J.: Mining roles with semantic meanings. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 21\u201330. ACM (2008)","DOI":"10.1145\/1377836.1377840"},{"issue":"4","key":"7_CR14","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1880022.1880030","volume":"13","author":"I Molloy","year":"2010","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., Lobo, J.: Mining roles with multiple objectives. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 36 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Ni, Q., Lobo, J., Calo, S., Rohatgi, P., Bertino, E.: Automating role-based provisioning by learning from examples. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 75\u201384. ACM (2009)","DOI":"10.1145\/1542207.1542222"},{"issue":"6","key":"7_CR16","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S Oh","year":"2003","unstructured":"Oh, S., Park, S.: Task-role-based access control model. Inf. Syst. 28(6), 533\u2013562 (2003)","journal-title":"Inf. Syst."},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-36288-0_11","volume-title":"Agents and Data Mining Interaction","author":"R Pan","year":"2013","unstructured":"Pan, R., Dolog, P., Xu, G.: KNN-based clustering for improving social recommender systems. In: Cao, L., Zeng, Y., Symeonidis, A.L., Gorodetsky, V.I., Yu, P.S., Singh, M.P. (eds.) ADMI 2012. LNCS, vol. 7607, pp. 115\u2013125. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36288-0_11"},{"issue":"2","key":"7_CR18","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models yz. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q., Adam, N.: Migrating to optimal RBAC with minimal perturbation. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 11\u201320. ACM (2008)","DOI":"10.1145\/1377836.1377839"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Algorithms for mining meaningful roles. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 57\u201366. ACM (2012)","DOI":"10.1145\/2295136.2295146"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies from RBAC policies. In: 2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT 2013), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/CEWIT.2013.6713753"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining parameterized role-based policies. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 255\u2013266. ACM (2013)","DOI":"10.1145\/2435349.2435384"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-662-43936-4_18","volume-title":"Data and Applications Security and Privacy XXVIII","author":"Z Xu","year":"2014","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies from logs. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 276\u2013291. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43936-4_18"},{"issue":"5","key":"7_CR24","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TDSC.2014.2369048","volume":"12","author":"Z Xu","year":"2015","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies. IEEE Trans. Dependable Secure Comput. 12(5), 533\u2013545 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: IEEE International Conference on Web Services (ICWS 2005). IEEE (2005)","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59647-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:21Z","timestamp":1750259181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59647-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596464","9783319596471"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59647-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}