{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T14:10:55Z","timestamp":1698502255914},"reference-count":14,"publisher":"Maria Curie-Sklodowska University","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1,1]]},"DOI":"10.2478\/v10065-010-0060-6","type":"journal-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T12:46:11Z","timestamp":1302180371000},"source":"Crossref","is-referenced-by-count":2,"title":["Modelling role hierarchy structure using the Formal Concept Analysis"],"prefix":"10.17951","volume":"10","author":[{"given":"\u015acibor","family":"Sobieski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bartosz","family":"Zieli\u0144ski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7349","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/0470011297","volume-title":"Concept Data Analysis. Theory and Applications","author":"C. Carpineto","year":"2004"},{"key":"2","volume-title":"Introduction to Lattices and Order","author":"B. Davey","year":"1990"},{"key":"3","first-page":"91","article-title":"Towards \"WYDIWYS\" for MIMI using concept analysis","author":"J. Dai","year":"2009"},{"key":"4","first-page":"554","article-title":"Role-based access controls","author":"D. Ferraiolo","year":"1992"},{"key":"5","unstructured":"Funk P., Lewien A., Snelting G., Algorithms for concept lattice decomposition and their application, Report 95-09 (Computer Science Department, Technische University at Braunschweig, 1995)."},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59830-2","volume-title":"Formal Concept Analysis. Mathematical Foundations","author":"B. Ganter","year":"1999"},{"key":"7","first-page":"349","article-title":"Assessing Modular Structure of Legacy Code Based on Mathematical Concept Analysis","author":"C. Lindig","year":"1997"},{"key":"8","first-page":"114","volume-title":"A Scalable Parametric-RBAC Architecture for the Propagation of a Multi-modality, Multi-resource Informatics System, Enterprise Information Systems","author":"R. Mueller","year":"2009"},{"issue":"1-2","key":"9","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.cose.2008.07.011","article-title":"Building access control models with attribute exploration","volume":"28","author":"S. Obiedkov","year":"2009","journal-title":"Computers & Security"},{"key":"10","article-title":"Formal Concept Analysis in Information Science, Cronin, Blaise","volume":"40","author":"U. Priss","year":"2005","journal-title":"Annual Review of Information Science and Technology"},{"issue":"2","key":"11","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"R. Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"12","unstructured":"Wille R., Restructuring lattice theory: an approach based on hierarchies of conceptes, Ordered Sets, Rival I. (1982)."},{"key":"13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00337926","article-title":"Tensorial decomposition of concept lattices","volume":"2","author":"R. Wille","year":"1985","journal-title":"Order"},{"key":"14","first-page":"127","article-title":"System of data analysis Concept Explorer","author":"S. Yevtushenko","year":"2000"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3292\/2486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:41Z","timestamp":1653493661000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":14,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.2478\/v10065-010-0060-6","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}