{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:12:36Z","timestamp":1725570756783},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642177132"},{"type":"electronic","value":"9783642177149"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17714-9_13","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T13:27:24Z","timestamp":1291728444000},"page":"171-185","source":"Crossref","is-referenced-by-count":26,"title":["Mining RBAC Roles under Cardinality Constraint"],"prefix":"10.1007","author":[{"given":"Ravi","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Arobinda","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Coyne, E.J.: Role engineering. In: Proceedings of the 1st ACM Workshop on Role Based Access Control, USA, pp. 15\u201316 (1995)"},{"key":"13_CR2","unstructured":"Vanamali, S.: WHITE PAPER: Role engineering and RBAC, Role engineering: The cornerstone of role based access control. In: CISA, CISSP, pp. 1\u20133 (2008)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The Role Mining Problem: Finding a minimal descriptive set of roles. In: The 12th ACM Symposium on Access Control Models and Technologies, France, pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"issue":"2","key":"13_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"3","key":"13_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-Based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Goh, C., Baldwin, A.: Towards a more complete model of role. In: Proceedings of the 3rd ACM Workshop on Role Based Access Control, USA, pp. 55\u201362 (1998)","DOI":"10.1145\/286884.286898"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Hawkins, J.C.: Determining role rights from use cases. In: Proceedings of the 2nd ACM Workshop on Role Based Access Control, USA, pp. 121\u2013125 (1997)","DOI":"10.1145\/266741.266767"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Rockle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In: Proceedings of the 5th ACM Workshop on Role Based Access Control, Germany, pp. 103\u2013110 (2000)","DOI":"10.1145\/344287.344308"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Neumann, G., Strembeck, M.: A scenario-driven role engineering process for functional RBAC roles. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, USA, pp. 33\u201342 (2002)","DOI":"10.1145\/507711.507717"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Shin, D., Ahn, G.J., Cho, S., Jin, S.: On modeling system-centric information for role engineering. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, Italy, pp. 169\u2013178 (2003)","DOI":"10.1145\/775412.775434"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Kern, A., Kuhlmann, M., Schaad, A., Moffett, J.: Observations on the role life-cycle in the context of enterprise security management. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, USA, pp. 43\u201351 (2002)","DOI":"10.1145\/507711.507718"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining - revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, Italy, pp. 179\u2013186 (2003)","DOI":"10.1145\/775412.775435"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Schlegelmilch, J., Steffens, U.: Role mining with ORCA. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Sweden, pp. 168\u2013176 (2005)","DOI":"10.1145\/1063979.1064008"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Warner, J.: RoleMiner: Mining roles using subset enumeration. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, USA, pp. 144\u2013153 (2006)","DOI":"10.1145\/1180405.1180424"},{"key":"13_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-30214-8_22","volume-title":"Discovery Science","author":"F. Geerts","year":"2004","unstructured":"Geerts, F., Goethals, B., Mielikainen, T.: Tiling databases. In: Suzuki, E., Arikawa, S. (eds.) DS 2004. LNCS (LNAI), vol.\u00a03245, pp. 278\u2013289. Springer, Heidelberg (2004)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Lu, H., Vaidya, J., Atluri, V.: Optimal Boolean matrix decomposition: Application to role engineering. In: Proceedings of the 24th IEEE International Conference on Data Engineering, USA, pp. 297\u2013306 (2008)","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ramamohanarao, K., Ebringer, T., Yann, T.: Permission set mining: Discovering practical and useful roles. In: Proceedings of the 2008 Annual Computer Security Applications Conference, USA, pp. 247\u2013256 (2008)","DOI":"10.1109\/ACSAC.2008.21"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., Lobo, J.: Evaluating role mining algorithms. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, Italy, pp. 95\u2013104 (2009)","DOI":"10.1145\/1542207.1542224"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimization. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, France, pp. 139\u2013144 (2007)","DOI":"10.1145\/1266840.1266862"},{"key":"13_CR20","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., Lobo, J.: Mining roles with multiple objectives. In: Review"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, USA, pp. 1\u201310 (2008)","DOI":"10.1145\/1377836.1377838"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S., Lobo, J.: Mining roles with semantic meanings. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, USA, pp. 21\u201330 (2008)","DOI":"10.1145\/1377836.1377840"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Colantonio, A., Pietro, R.D., Verde, N.V., Ocello, A.: A formal framework to elicit roles with business meaning in RBAC Systems. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, Italy, pp. 85\u201394 (2009)","DOI":"10.1145\/1542207.1542223"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-89862-7_24","volume-title":"Information Systems Security","author":"L. Fuchs","year":"2008","unstructured":"Fuchs, L., Pernul, G.: HyDRo - Hybrid development of roles. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 287\u2013302. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17714-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T21:47:52Z","timestamp":1559857672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17714-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642177132","9783642177149"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17714-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}