{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:24:01Z","timestamp":1768515841544,"version":"3.49.0"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T00:00:00Z","timestamp":1610409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1624503 and CNS-1747728"],"award-info":[{"award-number":["CNS-1624503 and CNS-1747728"]}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"crossref","award":["R01GM118574 and R35GM134927"],"award-info":[{"award-number":["R01GM118574 and R35GM134927"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>\n            For any successful business endeavor, recruitment of a required number of appropriately qualified employees in proper positions is a key requirement. For effective utilization of human resources, reorganization of such workforce assignment is also a task of utmost importance. This includes situations when the under-performing employees have to be substituted with fresh applicants. Generally, the number of candidates applying for a position is large, and hence, the task of identifying an optimal subset becomes critical. Moreover, a human resource manager would also like to make use of the opportunity of retirement of employees to improve manpower utilization. However, the constraints enforced by the security policies prohibit any arbitrary assignment of tasks to employees. Further, the new employees should have the capabilities required to handle the assigned tasks. In this article, we formalize this problem as the Optimal Recruitment Problem (ORP), wherein the goal is to select the minimum number of fresh employees from a set of candidates to fill the vacant positions created by the outgoing employees, while ensuring satisfiability of the specified security conditions. The model used for specification of authorization policies and constraints is Attribute-Based Access Control (ABAC), since it is considered to be the\n            <jats:italic>de facto<\/jats:italic>\n            next-generation framework for handling organizational security policies. We show that the ORP problem is NP-hard and propose a greedy heuristic for solving it. Extensive experimental evaluation shows both the effectiveness and efficiency of the proposed solution.\n          <\/jats:p>","DOI":"10.1145\/3403950","type":"journal-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:24:35Z","timestamp":1610479475000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Optimal Employee Recruitment in Organizations under Attribute-Based Access Control"],"prefix":"10.1145","volume":"12","author":[{"given":"Arindam","family":"Roy","sequence":"first","affiliation":[{"name":"Goa Institute of Management, India"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, India"}]},{"given":"Arun Kumar","family":"Majumdar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7420-6947","authenticated-orcid":false,"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, USA"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Axiomatics. 2016. The Evolution of RBAC Models to Next-Generation ABAC. Axiomatics (White Paper). Retrieved from www.axiomatics.com\/resources\/rbac-to-abac\/.  Axiomatics. 2016. The Evolution of RBAC Models to Next-Generation ABAC. Axiomatics (White Paper). Retrieved from www.axiomatics.com\/resources\/rbac-to-abac\/."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the ACM Symposium on Access Control Models and Technologies. 93--102","author":"Basin D.","unstructured":"D. Basin , S. J. Burri , and G. Karjoth . 2012. Optimal workflow-aware authorizations . In Proceedings of the ACM Symposium on Access Control Models and Technologies. 93--102 . D. Basin, S. J. Burri, and G. Karjoth. 2012. Optimal workflow-aware authorizations. In Proceedings of the ACM Symposium on Access Control Models and Technologies. 93--102."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"D. E. Bell and L. J. Lapadula. 1976. Secure computer system: Unified exposition and multics interpretation. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA.  D. E. Bell and L. J. Lapadula. 1976. Secure computer system: Unified exposition and multics interpretation. Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA.","DOI":"10.21236\/ADA023588"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 72--75","author":"Benkaouz Y.","unstructured":"Y. Benkaouz , M. Erradi , and B. Freisleben . 2016. Work in progress: K-nearest neighbors techniques for ABAC policies clustering . In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 72--75 . Y. Benkaouz, M. Erradi, and B. Freisleben. 2016. Work in progress: K-nearest neighbors techniques for ABAC policies clustering. In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 72--75."},{"key":"e_1_2_1_5_1","first-page":"3","article-title":"2013. Personnel scheduling: A literature review","volume":"226","author":"Bergh J. V.","year":"2013","unstructured":"J. V. Bergh , J. Beli\u00ebn , P. D. Bruecker , E. Demeulemeester , and L. D. Boeck . 2013. Personnel scheduling: A literature review . European Journal of Operational Research 226 , 3 ( 2013 ), 367--385. J. V. Bergh, J. Beli\u00ebn, P. D. Bruecker, E. Demeulemeester, and L. D. Boeck. 2013. Personnel scheduling: A literature review. European Journal of Operational Research 226, 3 (2013), 367--385.","journal-title":"European Journal of Operational Research"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of ACM Workshop on Attribute Based Access Control. 1--12","author":"Biswas P.","unstructured":"P. Biswas , R. Sandhu , and R. Krishnan . 2016. Label-based access control: An ABAC model with enumerated authorization policy . In Proceedings of ACM Workshop on Attribute Based Access Control. 1--12 . P. Biswas, R. Sandhu, and R. Krishnan. 2016. Label-based access control: An ABAC model with enumerated authorization policy. In Proceedings of ACM Workshop on Attribute Based Access Control. 1--12."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of International Conference on Signal Propagation and Computer Technology. 273--278","author":"Chatterjee S.","unstructured":"S. Chatterjee , A. K. Gupta , V. K. Mahor , and T. Sarmah . 2014. An efficient fine grained access control scheme based on attributes for enterprise class applications . In Proceedings of International Conference on Signal Propagation and Computer Technology. 273--278 . S. Chatterjee, A. K. Gupta, V. K. Mahor, and T. Sarmah. 2014. An efficient fine grained access control scheme based on attributes for enterprise class applications. In Proceedings of International Conference on Signal Propagation and Computer Technology. 273--278."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 184--194","author":"Clark D. D.","unstructured":"D. D. Clark and D. R. Wilson . 1987. A comparison of commercial and military computer security policies . In Proceedings of the IEEE Symposium on Security and Privacy. 184--194 . D. D. Clark and D. R. Wilson. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy. 184--194."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063986"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487226"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J. Dumay and J. Rooney. 2011. Dealing with an ageing workforce: Current and future implications. Journal of Human Resource Costing 8 Accounting 15 3 (2011) 174--195.  J. Dumay and J. Rooney. 2011. Dealing with an ageing workforce: Current and future implications. Journal of Human Resource Costing 8 Accounting 15 3 (2011) 174--195.","DOI":"10.1108\/14013381111178578"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 13--24","author":"Ferraiolo D.","unstructured":"D. Ferraiolo , R. Chandramouli , R. Kuhn , and V. Hu . 2016. Extensible access control markup language (XACML) and next generation access control (NGAC) . In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 13--24 . D. Ferraiolo, R. Chandramouli, R. Kuhn, and V. Hu. 2016. Extensible access control markup language (XACML) and next generation access control (NGAC). In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 13--24."},{"key":"e_1_2_1_14_1","volume-title":"Workforce downsizing: Strategies, archetypes, approaches and tactics. Journal of Management Research 13, 2","author":"Franco G.","year":"2013","unstructured":"G. Franco . 2013. Workforce downsizing: Strategies, archetypes, approaches and tactics. Journal of Management Research 13, 2 ( 2013 ), 67--76. G. Franco. 2013. Workforce downsizing: Strategies, archetypes, approaches and tactics. Journal of Management Research 13, 2 (2013), 67--76."},{"key":"e_1_2_1_15_1","unstructured":"F. Frisch. 2014. A technical view of the business case for Attribute Based Access Control (ABAC). Axiomatics (Case Study). Retrieved from www.axiomatics.com\/blog\/a-technical-view-of-the-business-case-for-attribute-based-access-control-abac-part-2\/.  F. Frisch. 2014. A technical view of the business case for Attribute Based Access Control (ABAC). Axiomatics (Case Study). Retrieved from www.axiomatics.com\/blog\/a-technical-view-of-the-business-case-for-attribute-based-access-control-abac-part-2\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"L. Fuchs G. Pernul and R. Sandhu. 2011. Roles in information security\u2013A survey and classification of the research area. Computers 8 Security 30 8 (2011) 748--769.  L. Fuchs G. Pernul and R. Sandhu. 2011. Roles in information security\u2013A survey and classification of the research area. Computers 8 Security 30 8 (2011) 748--769.","DOI":"10.1016\/j.cose.2011.08.002"},{"key":"e_1_2_1_17_1","unstructured":"H. Goldbeck. 2019. The 2020 Recession: What It Means for Recruiters. Recruiter. Retrieved from www.recruiter.com\/i\/the-2020-recession-what-it-means-for-recruiters\/.  H. Goldbeck. 2019. The 2020 Recession: What It Means for Recruiters. Recruiter. Retrieved from www.recruiter.com\/i\/the-2020-recession-what-it-means-for-recruiters\/."},{"key":"e_1_2_1_18_1","volume-title":"Five Steps to Optimizing Human Capital","author":"Goren B.","unstructured":"B. Goren . 2008. Five Steps to Optimizing Human Capital . SAS Institute Inc . Retrieved from www.sas.com\/resources\/asset\/5stepstooptimization.pdf. B. Goren. 2008. Five Steps to Optimizing Human Capital. SAS Institute Inc. Retrieved from www.sas.com\/resources\/asset\/5stepstooptimization.pdf."},{"key":"e_1_2_1_19_1","first-page":"5","article-title":"2013. A capability-based security approach to manage access control in the Internet of Things","volume":"58","author":"Gusmerolia S.","year":"2013","unstructured":"S. Gusmerolia , S. Piccionea , and D. Rotondi . 2013. A capability-based security approach to manage access control in the Internet of Things . Mathematical and Computer Modelling 58 , 5 \u2013 6 ( 2013 ), 1189--1205. S. Gusmerolia, S. Piccionea, and D. Rotondi. 2013. A capability-based security approach to manage access control in the Internet of Things. Mathematical and Computer Modelling 58, 5\u20136 (2013), 1189--1205.","journal-title":"Mathematical and Computer Modelling"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 25--34","author":"Hsu A. C.","unstructured":"A. C. Hsu and I. Ray . 2016. Specification and enforcement of location-aware attribute-based access control for online social networks . In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 25--34 . A. C. Hsu and I. Ray. 2016. Specification and enforcement of location-aware attribute-based access control for online social networks. In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. 25--34."},{"key":"e_1_2_1_22_1","unstructured":"V. C. Hu D. Ferraiolo R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication.  V. C. Hu D. Ferraiolo R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 58--67","author":"H\u00fcffmeyer M.","unstructured":"M. H\u00fcffmeyer and U. Schreier . 2016. RestACL - An access control language for RESTful services . In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 58--67 . M. H\u00fcffmeyer and U. Schreier. 2016. RestACL - An access control language for RESTful services. In Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 58--67."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005945211215"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771492"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 84--96","author":"Jin X.","unstructured":"X. Jin , R. Sandhu , and R. Krishnan . 2012a. RABAC: Role-centric attribute-based access control . In Proceedings of International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 84--96 . X. Jin, R. Sandhu, and R. Krishnan. 2012a. RABAC: Role-centric attribute-based access control. In Proceedings of International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 84--96."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. 41--55","author":"Jin X.","unstructured":"X. Jin , R. Sandhu , and R. Krishnan . 2012b. A unified attribute-based access control model covering DAC, MAC and RBAC . In Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. 41--55 . X. Jin, R. Sandhu, and R. Krishnan. 2012b. A unified attribute-based access control model covering DAC, MAC and RBAC. In Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. 41--55."},{"key":"e_1_2_1_28_1","volume-title":"Capability-Based Computer Systems","author":"Levy H. M.","unstructured":"H. M. Levy . 2014. Capability-Based Computer Systems . Digital Press . H. M. Levy. 2014. Capability-Based Computer Systems. Digital Press."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1237500.1237501"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Annual Computer Security Applications Conference. 131--139","author":"Miller D. V.","unstructured":"D. V. Miller and R. W. Baldwin . 1990. Access control by boolean expression evaluation . In Proceedings of the Annual Computer Security Applications Conference. 131--139 . D. V. Miller and R. W. Baldwin. 1990. Access control by boolean expression evaluation. In Proceedings of the Annual Computer Security Applications Conference. 131--139."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of International Conference on Computer Science and Network Technology. 1118--1122","author":"Qi H.","unstructured":"H. Qi , H. Ma , J. Li , and X. Di . 2015. Access control model based on role and attribute and its applications on space-ground integration networks . In Proceedings of International Conference on Computer Science and Network Technology. 1118--1122 . H. Qi, H. Ma, J. Li, and X. Di. 2015. Access control model based on role and attribute and its applications on space-ground integration networks. In Proceedings of International Conference on Computer Science and Network Technology. 1118--1122."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2015.38"},{"key":"e_1_2_1_33_1","volume-title":"12th International Conference on Intelligent Systems Design and Applications, 386--391","author":"Roy A.","unstructured":"A. Roy , S. Sural , and A. K. Majumdar . 2012. Minimum user requirement in role based access control with separation of duty constraints . In 12th International Conference on Intelligent Systems Design and Applications, 386--391 . A. Roy, S. Sural, and A. K. Majumdar. 2012. Minimum user requirement in role based access control with separation of duty constraints. In 12th International Conference on Intelligent Systems Design and Applications, 386--391."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the International Conference on Information Systems Security. 109--128","author":"Roy A.","unstructured":"A. Roy , S. Sural , and A. K. Majumdar . 2014. Impact of multiple t-t SMER constraints on minimum user requirement in RBAC . In Proceedings of the International Conference on Information Systems Security. 109--128 . A. Roy, S. Sural, and A. K. Majumdar. 2014. Impact of multiple t-t SMER constraints on minimum user requirement in RBAC. In Proceedings of the International Conference on Information Systems Security. 109--128."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811269"},{"key":"e_1_2_1_36_1","first-page":"4","article-title":"2016. On optimal employee assignment in constrained role-based access control systems","volume":"7","author":"Roy A.","year":"2016","unstructured":"A. Roy , S. Sural , A. K. Majumdar , J. Vaidya , and V. Atluri . 2016. On optimal employee assignment in constrained role-based access control systems . ACM Transactions on Management Information Systems 7 , 4 ( 2016 ), 10:1\u201310:24. A. Roy, S. Sural, A. K. Majumdar, J. Vaidya, and V. Atluri. 2016. On optimal employee assignment in constrained role-based access control systems. ACM Transactions on Management Information Systems 7, 4 (2016), 10:1\u201310:24.","journal-title":"ACM Transactions on Management Information Systems"},{"key":"e_1_2_1_37_1","first-page":"1","article-title":"2019. Enabling workforce optimization in constrained attribute based access control systems","author":"Roy A.","year":"2019","unstructured":"A. Roy , S. Sural , A. K. Majumdar , J. Vaidya , and V. Atluri . 2019. Enabling workforce optimization in constrained attribute based access control systems . IEEE Transactions on Emerging Topics in Computing (Early access) ( 2019 ). 1 -- 1 . DOI:https:\/\/doi.org\/10.1109\/TETC.2019.2944787 10.1109\/TETC.2019.2944787 A. Roy, S. Sural, A. K. Majumdar, J. Vaidya, and V. Atluri. 2019. Enabling workforce optimization in constrained attribute based access control systems. IEEE Transactions on Emerging Topics in Computing (Early access) (2019). 1--1. DOI:https:\/\/doi.org\/10.1109\/TETC.2019.2944787","journal-title":"IEEE Transactions on Emerging Topics in Computing (Early access) ("},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/103841119803600204"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the IEEE. 1278--1308","author":"Saltzer J. H.","unstructured":"J. H. Saltzer and M. D. Schroeder . 1975. The protection of information in computer systems . In Proceedings of the IEEE. 1278--1308 . J. H. Saltzer and M. D. Schroeder. 1975. The protection of information in computer systems. In Proceedings of the IEEE. 1278--1308."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_41_1","volume-title":"International Conference on Business Process Management. 465--470","author":"Schefer S.","unstructured":"S. Schefer , M. Strembeck , and J. Mendling . 2012. Checking satisfiability aspects of binding constraints in a business process context . In International Conference on Business Process Management. 465--470 . S. Schefer, M. Strembeck, and J. Mendling. 2012. Checking satisfiability aspects of binding constraints in a business process context. In International Conference on Business Process Management. 465--470."},{"key":"e_1_2_1_42_1","first-page":"4","article-title":"\u201cSlash and burn","volume":"37","author":"Schmenner R.","year":"1994","unstructured":"R. Schmenner and C. Lackey . 1994. \u201cSlash and burn \u201d doesn\u2019t kill weeds: Other ways to downsize the manufacturing organization. Business Horizons 37 , 4 ( 1994 ), 80--87. R. Schmenner and C. Lackey. 1994. \u201cSlash and burn\u201d doesn\u2019t kill weeds: Other ways to downsize the manufacturing organization. Business Horizons 37, 4 (1994), 80--87.","journal-title":"Business Horizons"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of International Symposium on Foundations and Practice of Security. 187--204","author":"Servos D.","unstructured":"D. Servos and S. L. Osborn . 2014. HGABAC: Towards a formal model of hierarchical attribute-based access control . In Proceedings of International Symposium on Foundations and Practice of Security. 187--204 . D. Servos and S. L. Osborn. 2014. HGABAC: Towards a formal model of hierarchical attribute-based access control. In Proceedings of International Symposium on Foundations and Practice of Security. 187--204."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"e_1_2_1_45_1","unstructured":"B. Smith and T. Rutigliano. 2001. Reducing staff the right way smart strategies for approaching a manager\u2019s toughest challenge: Choosing who stays and who goes. Gallup Business Journal. Retrieved from news.gallup.com\/businessjournal\/334\/reducing-staff-right-way.aspx.  B. Smith and T. Rutigliano. 2001. Reducing staff the right way smart strategies for approaching a manager\u2019s toughest challenge: Choosing who stays and who goes. Gallup Business Journal. Retrieved from news.gallup.com\/businessjournal\/334\/reducing-staff-right-way.aspx."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806557"},{"key":"e_1_2_1_47_1","volume-title":"Recruiters Preparing for the Recession of","author":"Starich M.","year":"2020","unstructured":"M. Starich . 2019. Recruiters Preparing for the Recession of 2020 . Recruiting Daily. Retrieved from recruitingdaily.com\/preparing-for-the-recession-of-2020\/. M. Starich. 2019. Recruiters Preparing for the Recession of 2020. Recruiting Daily. Retrieved from recruitingdaily.com\/preparing-for-the-recession-of-2020\/."},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems\u201d. 204--221","author":"Strembeck M.","unstructured":"M. Strembeck and J. Mendling . 2010. Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context . In Proceedings of OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems\u201d. 204--221 . M. Strembeck and J. Mendling. 2010. Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. In Proceedings of OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems\u201d. 204--221."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.11.015"},{"key":"e_1_2_1_50_1","volume-title":"IEEE Computer Security Foundations Workshop. 1--15","author":"Tan K.","unstructured":"K. Tan , J. Crampton , and C. A. Gunter . 2004. The consistency of task-based authorization constraints in workflow systems . In IEEE Computer Security Foundations Workshop. 1--15 . K. Tan, J. Crampton, and C. A. Gunter. 2004. The consistency of task-based authorization constraints in workflow systems. In IEEE Computer Security Foundations Workshop. 1--15."},{"key":"e_1_2_1_51_1","unstructured":"J. Tolan. [n.d.]. 4 Ways The Next Recession Will Change Recruitment. Spark Hire. Retrieved from hr.sparkhire.com\/tips-for-recruiters\/4-ways-the-next-recession-will-change-recruitment\/.  J. Tolan. [n.d.]. 4 Ways The Next Recession Will Change Recruitment. Spark Hire. Retrieved from hr.sparkhire.com\/tips-for-recruiters\/4-ways-the-next-recession-will-change-recruitment\/."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880034"},{"key":"e_1_2_1_53_1","first-page":"5","article-title":"2015. Mining attribute-based access control policies","volume":"4","author":"Xu Z.","year":"2015","unstructured":"Z. Xu and S. D. Stoller . 2015. Mining attribute-based access control policies . IEEE Transactions on Dependable and Secure Computing 4 , 5 ( 2015 ), 533--545. Z. Xu and S. D. Stoller. 2015. Mining attribute-based access control policies. IEEE Transactions on Dependable and Secure Computing 4, 5 (2015), 533--545.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744207"},{"key":"e_1_2_1_55_1","first-page":"3","article-title":"2008. Roles in information systems: A survey","volume":"38","author":"Zhu H.","year":"2008","unstructured":"H. Zhu and M. Zhou . 2008. Roles in information systems: A survey . IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews 38 , 3 ( 2008 ), 377--396. H. Zhu and M. Zhou. 2008. Roles in information systems: A survey. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews 38, 3 (2008), 377--396.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3403950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3403950","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3403950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:22Z","timestamp":1750199902000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3403950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,12]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3403950"],"URL":"https:\/\/doi.org\/10.1145\/3403950","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,12]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}