{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:59:39Z","timestamp":1768517979299,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1000"],"award-info":[{"award-number":["16KIS1000"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04046-6","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T09:15:25Z","timestamp":1750324525000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mining Two-Level Role Concepts Using Evolutionary Algorithms"],"prefix":"10.1007","volume":"6","author":[{"given":"Simon","family":"Anderer","sequence":"first","affiliation":[]},{"given":"Falk","family":"Schrader","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Scheuermann","sequence":"additional","affiliation":[]},{"given":"Sanaz","family":"Mostaghim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"issue":"2","key":"4046_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. Computer. 1996;29(2):38\u201347. https:\/\/doi.org\/10.1109\/2.485845.","journal-title":"Computer"},{"key":"4046_CR2","doi-asserted-by":"crossref","unstructured":"Vaidya J, Atluri V, Guo Q, Lotz V, Thuraisingham B. The role mining problem (Lotz V, Thuraisingham B (eds.), In: Proceedings of the 12th ACM symposium on access control models and technologies - SACMAT \u201907, 175\u201384 (ACM Press, New York, New York, USA, 2007).","DOI":"10.1145\/1266840.1266870"},{"key":"4046_CR3","doi-asserted-by":"crossref","unstructured":"Anderer S, Schrader F, Scheuermann B, Mostaghim S. Evolutionary algorithms for the constrained two-level role mining problem. In: European conference on evolutionary computation in combinatorial optimization (Part of EvoStar) 2022, 79\u201394 (Springer-Verlag, Berlin, Heidelberg, 2022).","DOI":"10.1007\/978-3-031-04148-8_6"},{"key":"4046_CR4","doi-asserted-by":"crossref","unstructured":"Anderer S, Kempter T, Scheuermann B, Mostaghim S. The dynamic role mining problem: role mining in dynamically changing business environments. In: Proceedings of the 13th international joint conference on computational intelligence, IJCCI 2021, 37\u201348 (SciTePress, 2021).","DOI":"10.5220\/0010654000003063"},{"key":"4046_CR5","doi-asserted-by":"crossref","unstructured":"Anderer S, Justen N, Scheuermann B, Mostaghim S. Interactive role mining including expert knowledge into evolutionary algorithm. In: Proceedings of the 15th international joint conference on computational intelligence, ECTA 2023, 151\u201362 (SciTePress, 2024).","DOI":"10.5220\/0012153000003595"},{"key":"4046_CR6","doi-asserted-by":"publisher","unstructured":"Anderer S, Scheuermann B, Mostaghim S, Bauerle P, Beil M. RMPlib: a library of benchmarks for the role mining problem, SACMAT \u201921, 3\u201313 (Association for Computing Machinery, New York, NY. USA. 2021. https:\/\/doi.org\/10.1145\/3450569.3463566.","DOI":"10.1145\/3450569.3463566"},{"issue":"3","key":"4046_CR7","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TDSC.2008.61","volume":"7","author":"J Vaidya","year":"2010","unstructured":"Vaidya J, Atluri V, Warner J, Guo Q. Role engineering via prioritized subset enumeration. IEEE Trans Depend Sec Comput. 2010;7(3):300\u201314. https:\/\/doi.org\/10.1109\/TDSC.2008.61.","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"issue":"3","key":"4046_CR8","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TDSC.2008.61","volume":"7","author":"J Vaidya","year":"2010","unstructured":"Vaidya J, Atluri V, Warner J, Guo Q. Role engineering via prioritized subset enumeration. IEEE Trans Depend Sec Comput. 2010;7(3):300\u201314. https:\/\/doi.org\/10.1109\/TDSC.2008.61.","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"4046_CR9","doi-asserted-by":"crossref","unstructured":"Lu H, Vaidya J, Atluri V. Optimal Boolean matrix decomposition: application to role engineering, 297\u2013306 (IEEE, 2008).","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"4046_CR10","doi-asserted-by":"crossref","unstructured":"Ene A, et\u00a0al. Fast exact and heuristic methods for role minimization problems (Ray I, Li N eds.), In: Proceedings of the 13th ACM symposium on Access control models and technologies-SACMAT \u201908. 1\u201310 (ACM Press, New York, New York, USA, 2008).","DOI":"10.1145\/1377836.1377838"},{"key":"4046_CR11","doi-asserted-by":"crossref","unstructured":"Saenko I, Kotenko I. Genetic algorithms for role mining problem, 646\u201350 (IEEE, 2011).","DOI":"10.1109\/PDP.2011.63"},{"issue":"3","key":"4046_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3093898","volume":"18","author":"I Saenko","year":"2018","unstructured":"Saenko I, Kotenko I. Genetic algorithms for solving problems of access control design and reconfiguration in computer networks. ACM Trans Int Technol. 2018;18(3):1\u201321. https:\/\/doi.org\/10.1145\/3093898.","journal-title":"ACM Trans. Int. Technol."},{"key":"4046_CR13","doi-asserted-by":"publisher","unstructured":"Anderer S, Kreppein D, Scheuermann B, Mostaghim S. The addRole-EA: a new evolutionary algorithm for the role mining problem, 155\u201366 (SCITEPRESS, 2020). https:\/\/doi.org\/10.5220\/0010025401550166.","DOI":"10.5220\/0010025401550166"},{"key":"4046_CR14","doi-asserted-by":"crossref","unstructured":"Schlegelmilch J, Steffens U, Ferrari E, Ahn GJ. Role mining with ORCA (Ferrari E, Ahn GJ eds.), In: Proceedings of the tenth ACM symposium on access control models and technologies-SACMAT \u201905. 168\u201376 (ACM Press, New York, New York, USA, 2005).","DOI":"10.1145\/1063979.1064008"},{"key":"4046_CR15","doi-asserted-by":"crossref","unstructured":"Zhang D, Ramamohanarao K, Ebringer T, Lotz V, Thuraisingham B. Role engineering using graph optimisation (Lotz V, Thuraisingham B eds.), In: Proceedings of the 12th ACM symposium on Access control models and technologies-SACMAT \u201907, 139\u201344 (ACM Press, New York, New York, USA, 2007).","DOI":"10.1145\/1266840.1266862"},{"key":"4046_CR16","doi-asserted-by":"crossref","unstructured":"Zhang D, Ramamohanarao K, Versteeg S, Zhang R, Sheldon FT, Prowell S, Abercrombie RK, Krings A. Graph based strategies to role engineering (Sheldon FT, Prowell S, Abercrombie RK, Krings A eds.), In: Proceedings of the sixth annual workshop on cyber security and information intelligence research - CSIIRW \u201910, 1\u20134 (ACM Press, New York, New York, USA, 2010).","DOI":"10.1145\/1852666.1852694"},{"key":"4046_CR17","doi-asserted-by":"crossref","unstructured":"Guo Q, Vaidya J, Atluri V. The role hierarchy mining problem: discovery of optimal role hierarchies, 237\u201346 (IEEE, 2008).","DOI":"10.1109\/ACSAC.2008.38"},{"key":"4046_CR18","doi-asserted-by":"crossref","unstructured":"Molloy I, et\u00a0al. Mining roles with semantic meanings (Ray I, Li N eds.), In: Proceedings of the 13th ACM symposium on Access control models and technologies-SACMAT \u201908, 21\u201330 (ACM Press, New York, New York, USA, 2008).","DOI":"10.1145\/1377836.1377840"},{"key":"4046_CR19","doi-asserted-by":"crossref","unstructured":"Takabi H, Joshi JB. Stateminer: an efficient similarity-based approach for optimal mining of role hierarchy, 55\u201364 (2010).","DOI":"10.1145\/1809842.1809853"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04046-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04046-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04046-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T09:44:28Z","timestamp":1753177468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04046-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":19,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4046"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04046-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,19]]},"assertion":[{"value":"2 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised due to incorrect spacing in the algorithm headings. Now, the algorithm headings are corrected.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"563"}}