{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:52:49Z","timestamp":1770277969681,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1145\/3532105.3535030","type":"proceedings-article","created":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T14:29:57Z","timestamp":1654698597000},"page":"115-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["The Secrecy Resilience of Access Control Policies and Its Application to Role Mining"],"prefix":"10.1145","author":[{"given":"Qiang","family":"Guo","sequence":"first","affiliation":[{"name":"BMO Financial Group, Toronto, ON, Canada"}]},{"given":"Mahesh","family":"Tripunitara","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463566"},{"key":"e_1_3_2_2_2_1","volume-title":"Elements of Information Theory","author":"Cover Thomas","year":"2006","unstructured":"Thomas Cover and Joy Thomas . Elements of Information Theory . Wiley-Interscience , 2 edition, 2006 . Thomas Cover and Joy Thomas. Elements of Information Theory. Wiley-Interscience, 2 edition, 2006."},{"key":"e_1_3_2_2_3_1","unstructured":"Niklas Een and Niklas Sorensson. The MiniSat page. http:\/\/minisat.se\/ last accessed: February 25 2022.  Niklas Een and Niklas Sorensson. The MiniSat page. http:\/\/minisat.se\/ last accessed: February 25 2022."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"e_1_3_2_2_5_1","volume-title":"Role mining with probabilistic models. ACM Trans. Inf. Syst. Secur., 15(4), apr","author":"Frank Mario","year":"2013","unstructured":"Mario Frank , Joachim M. Buhman , and David Basin . Role mining with probabilistic models. ACM Trans. Inf. Syst. Secur., 15(4), apr 2013 . Mario Frank, Joachim M. Buhman, and David Basin. Role mining with probabilistic models. ACM Trans. Inf. Syst. Secur., 15(4), apr 2013."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320482"},{"key":"e_1_3_2_2_8_1","volume-title":"Gurobi optimizer. gurobi.com, last accessed","year":"2022","unstructured":"Gurobi. Gurobi optimizer. gurobi.com, last accessed : February 25, 2022 . Gurobi. Gurobi optimizer. gurobi.com, last accessed: February 25, 2022."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330295.1330297"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187441.1187442"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.8.4.344"},{"key":"e_1_3_2_2_13_1","volume-title":"A survey of role mining. ACM Comput. Surv., 48(4), feb","author":"Mitra Barsha","year":"2016","unstructured":"Barsha Mitra , Shamik Sural , Jaideep Vaidya , and Vijayalakshmi Atluri . A survey of role mining. ACM Comput. Surv., 48(4), feb 2016 . Barsha Mitra, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. A survey of role mining. ACM Comput. Surv., 48(4), feb 2016."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542224"},{"key":"e_1_3_2_2_15_1","volume-title":"fall","author":"Nakayama Marvin","year":"2011","unstructured":"Marvin Nakayama . Cs 341 , fall 2011 , solutions for quiz 2, day section. Available from https:\/\/web.njit.edu\/ marvin\/cs341\/oldexams\/13fd-quiz2-soln.pdf, 2011. Marvin Nakayama. Cs 341, fall 2011, solutions for quiz 2, day section. Available from https:\/\/web.njit.edu\/ marvin\/cs341\/oldexams\/13fd-quiz2-soln.pdf, 2011."},{"key":"e_1_3_2_2_16_1","volume-title":"Boeing Frontiers","author":"Roby Michelle","year":"2006","unstructured":"Michelle Roby . Protecting national secrets . Boeing Frontiers , 05, May 2006 . Michelle Roby. Protecting national secrets. Boeing Frontiers, 05, May 2006."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_2_18_1","first-page":"466","volume-title":"On the Complexity of Derivation in Propositional Calculus","author":"Tseitin G. S.","year":"1983","unstructured":"G. S. Tseitin . On the Complexity of Derivation in Propositional Calculus , pages 466 -- 483 . Springer Berlin Heidelberg , Berlin, Heidelberg , 1983 . G. S. Tseitin. On the Complexity of Derivation in Propositional Calculus, pages 466--483. Springer Berlin Heidelberg, Berlin, Heidelberg, 1983."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1544133.1544137"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90100-C"}],"event":{"name":"SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies","location":"New York NY USA","acronym":"SACMAT '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535030","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532105.3535030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:14Z","timestamp":1750183754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":22,"alternative-id":["10.1145\/3532105.3535030","10.1145\/3532105"],"URL":"https:\/\/doi.org\/10.1145\/3532105.3535030","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"2022-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}