{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:10:29Z","timestamp":1770217829162,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/icde.2008.4497438","type":"proceedings-article","created":{"date-parts":[[2008,4,29]],"date-time":"2008-04-29T19:04:39Z","timestamp":1209495879000},"page":"297-306","source":"Crossref","is-referenced-by-count":109,"title":["Optimal Boolean Matrix Decomposition: Application to Role Engineering"],"prefix":"10.1109","author":[{"given":"Haibing","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"17","year":"0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373257"},{"key":"15","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-30214-8_22","article-title":"tiling databases","author":"geerts","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507718"},{"key":"13","author":"miettinen","year":"2006","journal-title":"The discrete basis problem"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.53"},{"key":"11","author":"schrijver","year":"1998","journal-title":"Theory of Linear and Integer Programming"},{"key":"12","year":"0"},{"key":"3","author":"vaidya","year":"0","journal-title":"Role Engineering Optimal User-Role and Role-Permission Assignment"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266862"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"6","article-title":"the economic impact of role-based access control","author":"gallagher","year":"2002","journal-title":"Planning report 02-1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"4","author":"coyne","year":"1995","journal-title":"1st ACM Workshop on Role-Based Access Control"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064008"}],"event":{"name":"2008 IEEE 24th International Conference on Data Engineering (ICDE 2008)","location":"Cancun, Mexico","start":{"date-parts":[[2008,4,7]]},"end":{"date-parts":[[2008,4,12]]}},"container-title":["2008 IEEE 24th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4492792\/4497384\/04497438.pdf?arnumber=4497438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:36:02Z","timestamp":1497771362000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4497438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icde.2008.4497438","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}