{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:17:54Z","timestamp":1767651474241},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T00:00:00Z","timestamp":1426636800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s00453-015-9986-9","type":"journal-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T11:20:26Z","timestamp":1426591226000},"page":"383-402","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem"],"prefix":"10.1007","volume":"75","author":[{"given":"Gregory","family":"Gutin","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Kratsch","sequence":"additional","affiliation":[]},{"given":"Magnus","family":"Wahlstr\u00f6m","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,18]]},"reference":[{"key":"9986_CR1","unstructured":"American National Standards Institute. ANSI INCITS 359-2004 for role based access control (2004)"},{"issue":"3","key":"9986_CR2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191\u2013233 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"9986_CR3","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65\u2013104 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9986_CR4","doi-asserted-by":"crossref","unstructured":"Betzler, N., Bredereck, R., Niedermeier, R.: Partial kernelization for rank aggregation: theory and experiments. In: IPEC, volume 6478 of LNCS, pp. 26\u201337. Springer (2010)","DOI":"10.1007\/978-3-642-17493-3_5"},{"key":"9986_CR5","doi-asserted-by":"crossref","unstructured":"Cohen, D., Crampton, J., Gagarin, A., Gutin, G., Jones, M.: Engineering algorithms for workflow satisfiability problem with user-independent constraints. In: FAW 2014, volume 8497 of LNCS, pp. 48\u201359. Springer (2014)","DOI":"10.1007\/978-3-319-08016-1_5"},{"key":"9986_CR6","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1613\/jair.4435","volume":"51","author":"D Cohen","year":"2014","unstructured":"Cohen, D., Crampton, J., Gagarin, A., Gutin, G., Jones, M.: Iterative plan construction for the workflow satisfiability problem. J. Artif. Intell. Res. 51, 555\u2013577 (2014)","journal-title":"J. Artif. Intell. Res."},{"key":"9986_CR7","doi-asserted-by":"crossref","unstructured":"Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: SACMAT, pp. 38\u201347. ACM (2005)","DOI":"10.1145\/1063979.1063986"},{"key":"9986_CR8","doi-asserted-by":"crossref","unstructured":"Crampton, J., Crowston, R., Gutin, G., Jones, M., Ramanujan, M.S.: Fixed-parameter tractability of workflow satisfiability in the presence of seniority constraints. In: FAW-AAIM, volume 7924 of LNCS, pp. 198\u2013209. Springer (2013)","DOI":"10.1007\/978-3-642-38756-2_21"},{"issue":"1","key":"9986_CR9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/2487222.2487226","volume":"16","author":"J Crampton","year":"2013","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Trans. Inf. Syst. Secur. 16(1), 4 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"4","key":"9986_CR10","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/2629620","volume":"61","author":"H Dell","year":"2014","unstructured":"Dell, H., van Melkebeek, D.: Satisfiability allows no nontrivial sparsification unless the polynomial-time hierarchy collapses. J. ACM 61(4), 23 (2014)","journal-title":"J. ACM"},{"issue":"2","key":"9986_CR11","first-page":"13","volume":"11","author":"M Dom","year":"2014","unstructured":"Dom, M., Lokshtanov, D., Saurabh, S.: Kernelization lower bounds through colors and ids. ACM Trans. Algorithms 11(2), 13 (2014)","journal-title":"ACM Trans. Algorithms"},{"key":"9986_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-5559-1","volume-title":"Fundamentals of Parameterized Complexity. Texts in Computer Science","author":"Rodney G Downey","year":"2013","unstructured":"Downey, Rodney G., Fellows, Michael R.: Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, Berlin (2013)"},{"key":"9986_CR13","doi-asserted-by":"crossref","unstructured":"Hermelin, D., Kratsch, S., Soltys, K., Wahlstr\u00f6m, M., Wu, X.: A completeness theory for polynomial (Turing) kernelization. In: IPEC, volume 8246 of LNCS, pp. 202\u2013215. Springer (2013)","DOI":"10.1007\/978-3-319-03898-8_18"},{"issue":"1","key":"9986_CR14","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J Joshi","year":"2005","unstructured":"Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng. 17(1), 4\u201323 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9986_CR15","doi-asserted-by":"crossref","unstructured":"Lokshtanov, D., Misra, N., Saurabh, S.: Kernelization\u2014preprocessing with a guarantee. In: The Multivariate Algorithmic Revolution and Beyond, volume 7370 of LNCS, pp. 129\u2013161. Springer (2012)","DOI":"10.1007\/978-3-642-30891-8_10"},{"issue":"2","key":"9986_CR16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"issue":"4","key":"9986_CR17","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1880022.1880034","volume":"13","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13(4), 40 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-015-9986-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00453-015-9986-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-015-9986-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T22:38:25Z","timestamp":1566427105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00453-015-9986-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,18]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["9986"],"URL":"https:\/\/doi.org\/10.1007\/s00453-015-9986-9","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"value":"0178-4617","type":"print"},{"value":"1432-0541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,18]]}}}