{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:24:40Z","timestamp":1725459880876},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362842"},{"type":"electronic","value":"9783642362859"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36285-9_72","type":"book-chapter","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T08:26:30Z","timestamp":1359015990000},"page":"719-724","source":"Crossref","is-referenced-by-count":7,"title":["A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models"],"prefix":"10.1007","author":[{"given":"Maria","family":"Leitner","sequence":"first","affiliation":[]},{"given":"Anne","family":"Baumgrass","sequence":"additional","affiliation":[]},{"given":"Sigrid","family":"Schefer-Wenzl","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"72_CR1","doi-asserted-by":"crossref","unstructured":"Baumgrass, A.: Deriving Current-State RBAC Models from Event Logs. In: Proc. of the 6th International Conference on Availability, Reliability and Security (ARES). IEEE Computer Society (2011)","DOI":"10.1109\/ARES.2011.104"},{"key":"72_CR2","doi-asserted-by":"crossref","unstructured":"Baumgrass, A., Schefer-Wenzl, S., Strembeck, M.: Deriving Process-Related RBAC Models from Process Execution Histories. In: Proc. of the 2012 IEEE 36th Int. Conference on Computer Software and Applications Workshops. IEEE Computer Society (2012)","DOI":"10.1109\/COMPSACW.2012.80"},{"key":"72_CR3","volume-title":"Role-Based Access Control","author":"D.F. Ferraiolo","year":"2007","unstructured":"Ferraiolo, D.F., Kuhn, R.D., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House, Inc., Norwood (2007)","edition":"2"},{"key":"72_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/11678564_16","volume-title":"Business Process Management Workshops","author":"L. Ly","year":"2006","unstructured":"Ly, L., Rinderle, S., Dadam, P., Reichert, M.: Mining Staff Assignment Rules from Event-Based Data. In: Bussler, C., Haller, A. (eds.) BPM 2005. LNCS, vol.\u00a03812, pp. 177\u2013190. Springer, Heidelberg (2006)"},{"key":"72_CR5","unstructured":"de Medeiros, A.K.A., G\u00fcnther, C.W.: Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms. In: Proc. of the 6th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (2005)"},{"key":"72_CR6","unstructured":"de Medeiros, A.K.A., van den Brand, P., van der Aalst, W.M.P., Weijters, T., Gaaloul, W., Pedrinaci, C.: Semantic Process Mining Tool - Final Implementation, Deliverable 6.11, Project IST 026850 SUPER (September 2008)"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Song, M., van der Aalst, W.M.P.: Towards comprehensive support for organizational mining. Decision Support Systems\u00a046(1) (2008)","DOI":"10.1016\/j.dss.2008.07.002"},{"key":"72_CR8","unstructured":"Strembeck, M.: A Role Engineering Tool for Role-Based Access Control. In: Proc. of the 3rd Symposium on Requirements Engineering for Information Security (SREIS) (August 2005)"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Strembeck, M., Mendling, J.: Modeling process-related RBAC models with extended UML activity models. Information and Software Technology\u00a053(5) (2011)","DOI":"10.1016\/j.infsof.2010.11.015"},{"key":"72_CR10","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (2011)","DOI":"10.1007\/978-3-642-19345-3"},{"key":"72_CR11","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., G\u00fcnther, C., Rozinat, A., Verbeek, H.M.W., Weijters, A.J.M.M.: ProM: The Process Mining Toolkit. In: Proc. of the BPM 2009 Demonstration Track. vol. 489. CEUR-WS.org (September 2009)"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ramamohanarao, K., Ebringer, T., Yann, T.: Permission Set Mining: Discovering Practical and Useful Roles. In: Proc. of the 2008 Annual Computer Security Applications Conference. IEEE Computer Society (2008)","DOI":"10.1109\/ACSAC.2008.21"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36285-9_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T18:11:42Z","timestamp":1644171102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36285-9_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362842","9783642362859"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36285-9_72","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}