{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T08:25:57Z","timestamp":1768465557270,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,11]],"date-time":"2008-06-11T00:00:00Z","timestamp":1213142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,11]]},"DOI":"10.1145\/1377836.1377840","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T14:13:22Z","timestamp":1213107202000},"page":"21-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":132,"title":["Mining roles with semantic meanings"],"prefix":"10.1145","author":[{"given":"Ian","family":"Molloy","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Tiancheng","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Qihua","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Seraphin","family":"Calo","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2008,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Boost C++ Libraries. http:\/\/www.boost.org\/.  Boost C++ Libraries. http:\/\/www.boost.org\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Nov.","author":"Buecker A.","year":"2005","unstructured":"A. Buecker , J. C. Palacios , B. Davis , T. Hastings , and I. Yip . Identity management design guide with ibm tivoli identity manager , Nov. 2005 . A. Buecker, J. C. Palacios, B. Davis, T. Hastings, and I. Yip. Identity management design guide with ibm tivoli identity manager, Nov. 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/270152.270159"},{"key":"e_1_3_2_1_5_1","volume-title":"Formal Concept Analysis: Mathematical Foundations","author":"Ganter B.","year":"1998","unstructured":"B. Ganter and R. Wille . Formal Concept Analysis: Mathematical Foundations . Springer , 1998 . B. Ganter and R. Wille. Formal Concept Analysis: Mathematical Foundations. Springer, 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"e_1_3_2_1_7_1","first-page":"2000","author":"Lindig C.","year":"2000","unstructured":"C. Lindig . Fast concept analysis. In G. Stumme , editor, Working with Conceptual Structures - Contributions to ICCS 2000 , 2000 . C. Lindig. Fast concept analysis. In G. Stumme, editor, Working with Conceptual Structures - Contributions to ICCS 2000, 2000.","journal-title":"ICCS"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507717"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344308"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775434"},{"key":"e_1_3_2_1_12_1","volume-title":"Oct.","author":"Stoller S. D.","year":"2007","unstructured":"S. D. Stoller , P. Yang , C. R. Ramakrishnan , and M. I. Gofman . Efficient policy analysis for administrative role based access control , Oct. 2007 . S. D. Stoller, P. Yang, C. R. Ramakrishnan, and M. I. Gofman. Efficient policy analysis for administrative role based access control, Oct. 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266862"}],"event":{"name":"SACMAT08: 13th ACM Symposium on Access Control Models and Technologies","location":"Estes Park CO USA","acronym":"SACMAT08","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 13th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1377836.1377840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1377836.1377840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:39Z","timestamp":1750254999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1377836.1377840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,11]]},"references-count":14,"alternative-id":["10.1145\/1377836.1377840","10.1145\/1377836"],"URL":"https:\/\/doi.org\/10.1145\/1377836.1377840","relation":{},"subject":[],"published":{"date-parts":[[2008,6,11]]},"assertion":[{"value":"2008-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}