{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:27Z","timestamp":1751602287609,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":[""],"award-info":[{"award-number":[""]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,8]]},"DOI":"10.1145\/3734436.3734443","type":"proceedings-article","created":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T17:32:44Z","timestamp":1751563964000},"page":"22-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["New Algorithms for Minimizing the Number of Edges in Bottom-Up Role Mining"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3137-1635","authenticated-orcid":false,"given":"Puneet","family":"Gill","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3615-9393","authenticated-orcid":false,"given":"Mahesh","family":"Tripunitara","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Simon Anderer. 2020. RMPlib. https:\/\/github.com\/RMPlib\/RMPlib"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463566"},{"key":"e_1_3_2_1_3_1","volume-title":"Probability and Statistics for STEM","author":"Barron Emmanuel N","unstructured":"Emmanuel N Barron and John G Del Greco. 2022. Probability and Statistics for STEM. Springer."},{"key":"e_1_3_2_1_4_1","unstructured":"James Bonifield. 2024. RoleMiner. https:\/\/github.com\/jbonifield3\/RoleMiner\/tree\/master"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/270152.270159"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3697833","article-title":"Bi-objective optimization in role mining","volume":"28","author":"Crampton Jason","year":"2024","unstructured":"Jason Crampton, Eduard Eiben, Gregory Gutin, Daniel Karapetyan, and Diptapriyo Majumdar. 2024. Bi-objective optimization in role mining. ACM Transactions on Privacy and Security, Vol. 28, 1 (2024), 1--22.","journal-title":"ACM Transactions on Privacy and Security"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"e_1_3_2_1_8_1","unstructured":"Puneet Gill and Mahesh Tripunitara. 2025. minedgerolemining. https:\/\/github.com\/puneetgill05\/minedgerolemining."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532105.3535030"},{"key":"e_1_3_2_1_10_1","unstructured":"LLC Gurobi Optimization. 2025. Gurobi. https:\/\/www.gurobi.com\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"On the computational complexity of edge concentration","volume":"101","author":"Lin Xuemin","year":"2000","unstructured":"Xuemin Lin. 2000. On the computational complexity of edge concentration. Discrete Applied Mathematics , Vol. 101, 1--3 (2000), 197--205.","journal-title":"Discrete Applied Mathematics"},{"key":"e_1_3_2_1_13_1","volume-title":"Fast concept analysis. Working with Conceptual Structures-Contributions to ICCS","author":"Lindig Christian","year":"2000","unstructured":"Christian Lindig. 2000. Fast concept analysis. Working with Conceptual Structures-Contributions to ICCS, Vol. 2000 (2000), 152--161."},{"key":"e_1_3_2_1_14_1","volume-title":"2008 IEEE 24th international conference on data engineering. IEEE, 297--306","author":"Lu Haibing","year":"2008","unstructured":"Haibing Lu, Jaideep Vaidya, and Vijayalakshmi Atluri. 2008. Optimal boolean matrix decomposition: Application to role engineering. In 2008 IEEE 24th international conference on data engineering. IEEE, 297--306."},{"key":"e_1_3_2_1_15_1","unstructured":"Ziqing Mao Qihua Wang and Jorge Lobo. 2009. Evaluating Role Mining Algorithms. (2009)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2871148"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377840"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880030"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/72910.73350"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in computers.","author":"Sandhu Ravi S","unstructured":"Ravi S Sandhu. 1998. Role-based access control. In Advances in computers. Vol. 46. Elsevier, 237--286."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3734436.3734442"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_1_23_1","first-page":"2","article-title":"Edge-RMP: Minimizing administrative assignments for role-based access control","volume":"17","author":"Vaidya Jaideep","year":"2009","unstructured":"Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, and Haibing Lu. 2009. Edge-RMP: Minimizing administrative assignments for role-based access control. J. Comput. Secur., Vol. 17, 2 (April 2009), 211--235.","journal-title":"J. Comput. Secur."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 13th ACM conference on Computer and communications security. 144--153","author":"Vaidya Jaideep","year":"2006","unstructured":"Jaideep Vaidya, Vijayalakshmi Atluri, and Janice Warner. 2006. Roleminer: mining roles using subset enumeration. In Proceedings of the 13th ACM conference on Computer and communications security. 144--153."},{"key":"e_1_3_2_1_25_1","volume-title":"Restructuring Lattice Theory: An Approach Based on Hierarchies of Concepts","author":"Wille Rudolf","unstructured":"Rudolf Wille. 2009. Restructuring Lattice Theory: An Approach Based on Hierarchies of Concepts. In Formal Concept Analysis, S\u00e9bastien Ferr\u00e9 and Sebastian Rudolph (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 314--339."}],"event":{"name":"SACMAT '25:SACMAT '25","location":"Stony Brook NY USA","sponsor":["sigsac ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 30th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T17:34:26Z","timestamp":1751564066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734436.3734443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":25,"alternative-id":["10.1145\/3734436.3734443","10.1145\/3734436"],"URL":"https:\/\/doi.org\/10.1145\/3734436.3734443","relation":{},"subject":[],"published":{"date-parts":[[2025,7,7]]},"assertion":[{"value":"2025-07-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}