{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:16:34Z","timestamp":1753884994196,"version":"3.41.2"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"vor","delay-in-days":175,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Scientific Research Projects of Colleges and Universities in Henan Province","award":["21A110005","2020GGJS027","2019GGJS040","202102310340"],"award-info":[{"award-number":["21A110005","2020GGJS027","2019GGJS040","202102310340"]}]},{"name":"Foundation of University Young Key Teacher of Henan Province","award":["21A110005","2020GGJS027","2019GGJS040","202102310340"],"award-info":[{"award-number":["21A110005","2020GGJS027","2019GGJS040","202102310340"]}]},{"name":"Scientific and Technological Project of Henan Province","award":["21A110005","2020GGJS027","2019GGJS040","202102310340"],"award-info":[{"award-number":["21A110005","2020GGJS027","2019GGJS040","202102310340"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Role\u2010based access control (RBAC) can effectively guarantee the security of user system data. With its good flexibility and security, RBAC occupies a mainstream position in the field of access control. However, the complexity and time\u2010consuming of the role establishment process seriously hinder the development and application of the RBAC model. The introduction of the assistant interactive question answering algorithm based on attribute exploration (semiautomatic heuristic way to build an RBAC system) greatly reduces the complexity of building a role system. However, there are some defects in the auxiliary interactive Q&amp;A algorithm based on attribute exploration. The algorithm is not only unable to support multiperson collaborative work but also difficult to find qualified Q&amp;A experts in practical work. Aiming at the above problems, this paper proposes a model collaborative learning and exploration of RBAC roles under the framework of attribute exploration. In this model, after interactive Q&amp;A with experts in different permissions systems by using attribute exploration, the obtained results are merged and calculated to get the correct role system. This model not only avoids the time\u2010consuming process of role requirement analysis but also provides a feasible scheme for collaborative role discovery in multidepartment permissions.<\/jats:p>","DOI":"10.1155\/2021\/5549109","type":"journal-article","created":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T19:50:08Z","timestamp":1624650608000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Model Study on Collaborative Learning and Exploration of RBAC Roles"],"prefix":"10.1155","volume":"2021","author":[{"given":"Jiyong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiajiong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Wan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Ge","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8092-3459","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"HaoLin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,6,25]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1002\/acs.2995"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/acs.3027"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01325-4"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719899374"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.09667"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_11_7_2","unstructured":"SandhuR. FerraioloD. andKuhnR. The NIST model for role based access control: Towards a unified standard Proc ofthe 5th ACM Workshop on Role Based Access Control 2020 New York NY:ACM Press 47\u201363."},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1085-0"},{"key":"e_1_2_11_9_2","unstructured":"FerraioloD. CuginiJ. andKuhnD. R. Role-based access control (RBAC): Features and motivations Proceedings of 11th annual computer security application conference 1995 New Orleans Louisiana United States 241\u2013248."},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00609-6"},{"volume-title":"Role Mining in Business:Taming Role-Based Access Control Administration","year":"2012","author":"Colantonio A.","key":"e_1_2_11_11_2"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.002"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101876"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2782847"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2019.2930645"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3014492"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.065"},{"key":"e_1_2_11_19_2","first-page":"2371","article-title":"Theory and algorithm of role minimization problem in RBAC model based on concept lattice","volume":"42","author":"Zhang L.","year":"2014","journal-title":"Acta Electronics Sinica"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59830-2"},{"volume-title":"Formal Concept Analysis: Mathematical Foundations","year":"2012","author":"Ganter B.","key":"e_1_2_11_21_2"},{"key":"e_1_2_11_22_2","first-page":"58","article-title":"Knowledge discovery based on concept lattice and its application in university employment data analysis","volume":"50","author":"Qin L.","year":"2015","journal-title":"Journal of Shandong University (Natural Science Edition)"},{"key":"e_1_2_11_23_2","first-page":"54","article-title":"Attribute exploration algorithm based on uncorrelated attribute sets","volume":"48","author":"Shen X.","year":"2021","journal-title":"Computer Science"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.024"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3010918"},{"key":"e_1_2_11_26_2","first-page":"619","article-title":"Concept lattice theory and method and their research prospect","volume":"33","author":"Li J.","year":"2020","journal-title":"Pattern Recognition and Artificial Intelligence"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.589"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5549109.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5549109.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5549109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:33:45Z","timestamp":1723026825000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5549109"}},"subtitle":[],"editor":[{"given":"Lihua","family":"Yin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5549109"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5549109","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-02-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5549109"}}