{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:53:59Z","timestamp":1753275239122,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,3,6]],"date-time":"2018-03-06T00:00:00Z","timestamp":1520294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"budgetary subjects","award":["0073-2015-0004, 0073-2015-0007"],"award-info":[{"award-number":["0073-2015-0004, 0073-2015-0007"]}]},{"DOI":"10.13039\/501100002261","name":"RFBR","doi-asserted-by":"crossref","award":["15-07-07451, 16-37-00338, 16-29-09482, 18-07-01488"],"award-info":[{"award-number":["15-07-07451, 16-37-00338, 16-29-09482, 18-07-01488"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012535","name":"ITMO University","doi-asserted-by":"crossref","award":["Grant 074-U01"],"award-info":[{"award-number":["Grant 074-U01"]}],"id":[{"id":"10.13039\/501100012535","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2018,8,31]]},"abstract":"<jats:p>To create solutions for providing the required access control in computer networks it is not sufficient to have only tools and protocols in the network that are needed for it. It is necessary to create corresponding configuration, or scheme, of such tools, which will allow us to satisfy the existing security requirements. At the same time, the problems of creating an access control scheme, as a rule, are NP-complete and require heuristic models for their solving. In this article, we propose a unified approach to creation of control access schemes, based on usage of genetic algorithms. The approach is applied not only to original schemes configuration but to reconfiguration as well. Successful testing of the suggested approach on RBAC, VLAN, and VPN schemes allows us to suppose that it may be applied to other types of access control schemes as well. Experimental testing of suggested genetic algorithms, performed on a\u00a0specially designed test bed, showed their sufficiently high efficiency.<\/jats:p>","DOI":"10.1145\/3093898","type":"journal-article","created":{"date-parts":[[2018,3,7]],"date-time":"2018-03-07T19:00:36Z","timestamp":1520449236000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks"],"prefix":"10.1145","volume":"18","author":[{"given":"Igor","family":"Saenko","sequence":"first","affiliation":[{"name":"Saint-Petersburg Institute of Informatics and Automation of Russian Academy of Sciences, and St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[{"name":"Saint-Petersburg Institute of Informatics and Automation of Russian Academy of Sciences, and St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,3,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.endm.2004.03.007"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774503"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 8th International Workshop (STM\u201912)","volume":"7783","author":"Blundo Carlo","year":"2012","unstructured":"Carlo Blundo and Stelvio Cimato . 2012 . Constrained role mining. In Security and Trust Management . Proceedings of the 8th International Workshop (STM\u201912) , Lecture Notes in Computer Science , Vol. 7783 . Springer-Verlag, Berlin, Germany, 289--304. Carlo Blundo and Stelvio Cimato. 2012. Constrained role mining. In Security and Trust Management. Proceedings of the 8th International Workshop (STM\u201912), Lecture Notes in Computer Science, Vol. 7783. Springer-Verlag, Berlin, Germany, 289--304."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507841"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364198"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01244-0_33"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316209"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809851"},{"key":"e_1_2_1_9_1","first-page":"1","article-title":"Multi-assignment clustering for boolean data","volume":"13","author":"Frank Mario","year":"2012","unstructured":"Mario Frank , Andreas P. Streich , David Basin , and Joachim M. Buhmann . 2012 . Multi-assignment clustering for boolean data . J. Mach. Learn. Res. 13 , 1 (January 2012) 459--489. Mario Frank, Andreas P. Streich, David Basin, and Joachim M. Buhmann. 2012. Multi-assignment clustering for boolean data. J. Mach. Learn. Res. 13, 1 (January 2012) 459--489.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445567"},{"volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning (1st. ed.)","author":"Goldberg David E.","key":"e_1_2_1_11_1","unstructured":"David E. Goldberg . 1989. Genetic Algorithms in Search, Optimization, and Machine Learning (1st. ed.) . Addison Wesley Longman Publishing Co., Inc. David E. Goldberg. 1989. Genetic Algorithms in Search, Optimization, and Machine Learning (1st. ed.). Addison Wesley Longman Publishing Co., Inc."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185638"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/050626259"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019254"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2015.23"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"e_1_2_1_17_1","unstructured":"Usama Mehboob Junaid Qadir Salman Ali and Athanasios Vasilakos. 2014. Genetic algorithms in wireless networking: Techniques applications and issues. Retrieved from http:\/\/www.pitt.edu\/\u223cdtipper\/Apaper2002_1.pdf.  Usama Mehboob Junaid Qadir Salman Ali and Athanasios Vasilakos. 2014. Genetic algorithms in wireless networking: Techniques applications and issues. Retrieved from http:\/\/www.pitt.edu\/\u223cdtipper\/Apaper2002_1.pdf."},{"key":"e_1_2_1_18_1","volume-title":"Genetic Algorithms + Data Structures = Evolution Programs","author":"Michalewicz Zbigniew","unstructured":"Zbigniew Michalewicz . 1996. Genetic Algorithms + Data Structures = Evolution Programs ( 3 rd ed.). Springer-Verlag , London . Zbigniew Michalewicz. 1996. Genetic Algorithms + Data Structures = Evolution Programs (3rd ed.). Springer-Verlag, London.","edition":"3"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020424"},{"volume-title":"An Introduction to Genetic Algorithms","author":"Mitchell Melanie","key":"e_1_2_1_20_1","unstructured":"Melanie Mitchell . 1998. An Introduction to Genetic Algorithms , MIT Press , Cambridge, MA . Melanie Mitchell. 1998. An Introduction to Genetic Algorithms, MIT Press, Cambridge, MA."},{"key":"e_1_2_1_21_1","first-page":"4952","article-title":"Int","volume":"5","author":"Rai Neha","year":"2014","unstructured":"Neha Rai and Khushbu Rai . Genetic Algorithm Based Intrusion Detection System . 2014 . Int . J. Comput. Sci. Info. Technol. 5 , 4 (2014) 4952 -- 4957 . Neha Rai and Khushbu Rai. Genetic Algorithm Based Intrusion Detection System. 2014. Int. J. Comput. Sci. Info. Technol. 5, 4 (2014) 4952--4957.","journal-title":"J. Comput. Sci. Info. Technol."},{"key":"e_1_2_1_22_1","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Network Security","author":"Saenko Igor","unstructured":"Igor Saenko and Igor Kotenko . 2010. Optimization of access control schemes in virtual local area networks . In Computer Network Security . Lecture Notes in Computer Science , Vol. 6258 , Springer-Verlag , Berlin , 209--216. Igor Saenko and Igor Kotenko. 2010. Optimization of access control schemes in virtual local area networks. In Computer Network Security. Lecture Notes in Computer Science, Vol. 6258, Springer-Verlag, Berlin, 209--216."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2011.63"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2012.31"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10422-5_11"},{"volume-title":"Studies in Computational Intelligence, 616","author":"Saenko Igor","key":"e_1_2_1_26_1","unstructured":"Igor Saenko and Igor Kotenko . 2015b. Reconfiguration of access schemes in virtual networks of the internet of things by genetic algorithms . In Studies in Computational Intelligence, 616 , Springer International Publishing , 155--165. Igor Saenko and Igor Kotenko. 2015b. Reconfiguration of access schemes in virtual networks of the internet of things by genetic algorithms. In Studies in Computational Intelligence, 616, Springer International Publishing, 155--165."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970033"},{"volume-title":"Studies in Computational Intelligence, 678","author":"Saenko Igor","key":"e_1_2_1_28_1","unstructured":"Igor Saenko and Igor Kotenko . 2017. Reconfiguration of RBAC schemes by genetic algorithms . In Studies in Computational Intelligence, 678 , Springer International Publishing , 89--98. Igor Saenko and Igor Kotenko. 2017. Reconfiguration of RBAC schemes by genetic algorithms. In Studies in Computational Intelligence, 678, Springer International Publishing, 89--98."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 2008 High Performance Computing 8 Simulation Conference (HPCS\u201908)","author":"Semmanche Nabila","year":"2008","unstructured":"Nabila Semmanche and Sadika Selka . 2008 . Access control of web services using genetic algorithms . In Proceedings of the 2008 High Performance Computing 8 Simulation Conference (HPCS\u201908) . ECMS, Nicosia, Cyprus, 249--254. Nabila Semmanche and Sadika Selka. 2008. Access control of web services using genetic algorithms. In Proceedings of the 2008 High Performance Computing 8 Simulation Conference (HPCS\u201908). ECMS, Nicosia, Cyprus, 249--254."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2008.317"},{"key":"e_1_2_1_32_1","unstructured":"Anotai Srikitja and David Tipper. 2002. QoS-based virtual private network design for an MPLS network. Retrieved from http:\/\/www.pitt.edu\/\u223cdtipper\/Apaper2002_1.pdf.  Anotai Srikitja and David Tipper. 2002. QoS-based virtual private network design for an MPLS network. Retrieved from http:\/\/www.pitt.edu\/\u223cdtipper\/Apaper2002_1.pdf."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.07.148"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2003.811564"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093898","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:16Z","timestamp":1750217416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,6]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8,31]]}},"alternative-id":["10.1145\/3093898"],"URL":"https:\/\/doi.org\/10.1145\/3093898","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2018,3,6]]},"assertion":[{"value":"2010-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}