{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:54:29Z","timestamp":1725731669107},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/isda.2012.6416569","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:50:06Z","timestamp":1359568206000},"page":"386-391","source":"Crossref","is-referenced-by-count":4,"title":["Minimum user requirement in Role Based Access Control with Separation of Duty constraints"],"prefix":"10.1109","author":[{"given":"Arindam","family":"Roy","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Majumdar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Matgraph A Matlab Toolbox for Graph Theory","year":"2012","author":"scheinerman","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/270152.270177"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"18"},{"journal-title":"Chromatic Graph Theory","year":"2009","author":"chartrand","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.21"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_13"},{"key":"12","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-17714-9_13","article-title":"Mining RBAC roles under cardinality constraint","author":"kumar","year":"2010","journal-title":"Proceedings of the 6th International Conference on Information Systems Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806557"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1287\/opre.45.1.92"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1989.81042"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940855"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1237500.1237501"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Secure Computer System Unified Exposition and Multics Interpretation"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"}],"event":{"name":"2012 12th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2012,11,27]]},"location":"Kochi, India","end":{"date-parts":[[2012,11,29]]}},"container-title":["2012 12th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6409495\/6416502\/06416569.pdf?arnumber=6416569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T22:11:18Z","timestamp":1562623878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6416569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isda.2012.6416569","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}