{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:29Z","timestamp":1738777229872,"version":"3.37.0"},"reference-count":21,"publisher":"Academy Publisher","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.8.2079-2088","type":"journal-article","created":{"date-parts":[[2014,8,8]],"date-time":"2014-08-08T01:04:11Z","timestamp":1407459851000},"source":"Crossref","is-referenced-by-count":1,"title":["A Network-Cliques Based Role Mining Model"],"prefix":"10.4304","volume":"9","author":[{"given":"Lijun","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jinxia","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Benjie","family":"Pi","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,8,7]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70760-8_12"},{"key":"ref2","article-title":"Role Engineering","volume-title":"Proc 1st ACM Workshop on Role-Based Access Control","author":"Coyne","year":"1995","unstructured":"[3] E. J. Coyne, \"Role Engineering,\" in Proc. 1st ACM Workshop on Role-Based Access Control, 1995."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"ref4","first-page":"144","article-title":"RoleMiner: Mining Roles Using Subset Enumeration.","volume-title":"Proc 13th ACM Conference on Computer and Communications Security","author":"Vaidya","year":"2006","unstructured":"[5] J. Vaidya, V. Atluri, J. Warner. RoleMiner: Mining Roles Using Subset Enumeration. In Proc. 13th ACM Conference on Computer and Communications Security, 2006, pp. 144-153"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.37"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445567"},{"key":"ref7","first-page":"179","article-title":"Role mining-revealing business roles for security administration using data mining technology","volume-title":"Proc 8th ACM symposium on Access control models and technologies","author":"Kuhlmann","year":"2003","unstructured":"[9] M. Kuhlmann, D. Shohat and G. Schimpf, \"Role mining-revealing business roles for security administration using data mining technology,\" in Proc. 8th ACM symposium on Access control models and technologies, 2003, pp. 179-186."},{"key":"ref8","first-page":"655","article-title":"Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition","volume":"9","author":"Lu","year":"2012","unstructured":"[10] H. Lu, J. Vaidya, V. Atluri, and Y. Hong, \"Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition,\" IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 655-669, 2012.","journal-title":"IEEE Trans Depend Secure Comput","ISSN":"https:\/\/id.crossref.org\/issn\/1545-5971","issn-type":"print"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266862"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/1852666.1852694","article-title":"Graph Based Strategies to Role Engineering","volume-title":"Proc 6th Annual Workshop on Cyber Security and Information Intelligence Research","author":"Zhang","year":"2010","unstructured":"[13] D. Zhang, K. Ramamohanarao and S. Verseteeg, \"Graph Based Strategies to Role Engineering,\" in Proc. 6th Annual Workshop on Cyber Security and Information Intelligence Research, 2010, Article No. 25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.01.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344303"},{"key":"ref15","volume-title":"\"RBAC & Role Mining \" Technical report","author":"Sel","year":"2004","unstructured":"[19] M. Sel, \"RBAC & Role Mining,\" Technical report, COSIC, 2004"},{"issue":"8","key":"ref16","first-page":"443","article-title":"Genetic Algorithms Based Solution to Maximum Clique Problem","volume":"4","author":"Bhasin","year":"2012","unstructured":"[20] H. Bhasin, R. Mahajan, \"Genetic Algorithms Based Solution to Maximum Clique Problem,\" International Journal on Computer Science and Engineering, 2012, 4, (8), pp. 443-1448","journal-title":"Int J Comput Sci Eng","ISSN":"https:\/\/id.crossref.org\/issn\/1742-7185","issn-type":"print"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9247-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10732-010-9143-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/nature03607"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339723"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:07:31Z","timestamp":1738775251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,7]]},"references-count":21,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2014,8,7]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.8.2079-2088","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,8,7]]}}}