{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:48:55Z","timestamp":1770220135898,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642137389","type":"print"},{"value":"9783642137396","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_7","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"97-112","source":"Crossref","is-referenced-by-count":9,"title":["Role Mining in the Presence of Noise"],"prefix":"10.1007","author":[{"given":"Jaideep","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Haibing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., et al.: Role-based Access Control Models. IEEE Computer, 38\u201347 (February 1996)","DOI":"10.1109\/2.485845"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. In: TISSEC (2001)","DOI":"10.1145\/501978.501980"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Coyne, E.J.: Role-engineering. In: 1st ACM Workshop on Role-Based Access Control (1995)","DOI":"10.1145\/270152.270159"},{"key":"7_CR4","unstructured":"Gallagher, M.P., O\u2019Connor, A., Kropp, B.: The economic impact of role-based access control. Planning report 02-1, National Institute of Standards and Technology (March 2002)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Roeckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement role-based security administraiton in a large industrial organization. In: ACM (ed.) RBAC (2000)","DOI":"10.1145\/344287.344308"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Neumann, G., Strembeck, M.: A scenario-driven role engineering process for functional rbac roles. In: 7th ACM Symposium on Access Control Models and Technologies (June 2002)","DOI":"10.1145\/507711.507717"},{"key":"7_CR7","volume-title":"Symposium on Access Control Models and Technologies (SACMAT)","author":"J. Schlegelmilch","year":"2005","unstructured":"Schlegelmilch, J., Steffens, U.: Role mining with orca. In: Symposium on Access Control Models and Technologies (SACMAT), June 2005, ACM, New York (2005)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Warner, J.: Roleminer: mining roles using subset enumeration. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 144\u2013153 (2006)","DOI":"10.1145\/1180405.1180424"},{"key":"7_CR9","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/JCS-2009-0341","volume":"17","author":"J. Vaidya","year":"2009","unstructured":"Vaidya, J., Atluri, V., Guo, Q., Lu, H.: Edge-rmp: Minimizing administrative assignments for role-based access control. Journal of Computer Security\u00a017, 211\u2013235 (2009)","journal-title":"Journal of Computer Security"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1377836.1377840","volume-title":"SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies","author":"I. Molloy","year":"2008","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., Lobo, J.: Mining roles with semantic meanings. In: SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 21\u201330. ACM, New York (2008)"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/1266840.1266862","volume-title":"SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies","author":"D. Zhang","year":"2007","unstructured":"Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimisation. In: SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 139\u2013144. ACM, New York (2007)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Ene, A., Horne, W., Milosavljevic, N., Rao, P., reiber, R.S., Tarjan, R.: Fast exact and heuristic methods for role minimization problems. In: The ACM Symposium on Access Control Models and Technologies (June 2008)","DOI":"10.1145\/1377836.1377838"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q., Adam, N.: Migrating to optimal rbac with minimal perturbation. In: The ACM Symposium on Access Control Models and Technologies (June 2008)","DOI":"10.1145\/1377836.1377839"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Guo, Q., Vaidya, J., Atluri, V.: The role hierarchy mining problem: Discovery of optimal role hierarchies. In: Proceedings of the 24th Annual Computer Security Applications Conference, December 8-12, pp. 237\u2013246 (2008)","DOI":"10.1109\/ACSAC.2008.38"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Lu, H., Vaidya, J., Atluri, V.: Optimal boolean matrix decomposition: Application to role engineering. In: IEEE International Conference on Data Engineering (April 2008)","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1653662.1653675","volume-title":"CCS 2009: Proceedings of the 16th ACM conference on Computer and communications security","author":"M. Frank","year":"2009","unstructured":"Frank, M., Streich, A.P., Basin, D., Buhmann, J.M.: A probabilistic approach to hybrid role mining. In: CCS 2009: Proceedings of the 16th ACM conference on Computer and communications security, pp. 101\u2013111. ACM, New York (2009)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-89862-7_24","volume-title":"Information Systems Security","author":"L. Fuchs","year":"2008","unstructured":"Fuchs, L., Pernul, G.: Hydro - hybrid development of roles. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 287\u2013302. Springer, Heidelberg (2008)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: Finding a minimal descriptive set of roles. In: The Twelth ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20\u201322, pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset enumeration. IEEE Transactions on Dependable and Secure Computing (to appear)","DOI":"10.1109\/TDSC.2008.61"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: A formal perspective. ACM Transactions on Information Systems Security (to appear)","DOI":"10.1145\/1805974.1805983"},{"key":"7_CR21","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley-Interscience Publication, Hoboken (2000)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:38Z","timestamp":1606185758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}