{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:11:52Z","timestamp":1726103512812},"publisher-location":"Singapore","reference-count":61,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811596087"},{"type":"electronic","value":"9789811596094"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9609-4_4","type":"book-chapter","created":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T11:03:18Z","timestamp":1604228598000},"page":"34-50","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Role Mining: Survey and Suggestion on Role Mining in Access Control"],"prefix":"10.1007","author":[{"given":"Jinsuo","family":"Jia","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4411-0741","authenticated-orcid":false,"given":"Jianfeng","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"issue":"5","key":"4_CR1","doi-asserted-by":"publisher","first-page":"8471","DOI":"10.1109\/JIOT.2019.2919635","volume":"6","author":"W Yan","year":"2019","unstructured":"Yan, W., Mestha, L.K., Abbaszadeh, M.: Attack detection for securing cyber physical systems. IEEE Internet Things J. 6(5), 8471\u20138481 (2019)","journal-title":"IEEE Internet Things J."},{"key":"4_CR2","unstructured":"Weinberger, S.: Top ten most-destructive computer viruses, 19 2012 (2012). \nSmithsonian.com"},{"key":"4_CR3","unstructured":"Cybersecurity Unit, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice. A framework for a vulnerability disclosure program for online systems. \nhttps:\/\/www.justice.gov\/criminal-ccips\/page\/file\/983996\/download\n\n. Accessed 21 May 2019"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"123746","DOI":"10.1109\/ACCESS.2019.2936043","volume":"7","author":"J Guan","year":"2019","unstructured":"Guan, J., Zhang, Y., Yao, S., Wang, L.: AID shuffling mechanism based on group-buying auction for identifier network security. IEEE Access 7, 123746\u2013123756 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"4_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MAHC.2015.27","volume":"37","author":"SB Lipner","year":"2015","unstructured":"Lipner, S.B.: The birth and death of the orange book. IEEE Ann. Hist. Comput. 37(2), 19\u201331 (2015)","journal-title":"IEEE Ann. Hist. Comput."},{"key":"4_CR6","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control: a multi-dimensional view. In: Tenth Annual Computer Security Applications Conference, pp. 54\u201362, December 1994 (1994)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Ferraiolo, D.F., Kuhn, D.R.: The NIST model for role-based access control: towards a unified standard. In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, 26\u201327 July 2000, pp. 47\u201363 (2000)","DOI":"10.1145\/344287.344301"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"65:1","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos, D., Osborn, S.L.: Current research and open problems in attribute-based access control. ACM Comput. Surv. 49(4), 65:1\u201365:45 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"4_CR9","first-page":"1","volume":"9","author":"C Gritti","year":"2018","unstructured":"Gritti, C., \u00d6nen, M., Molva, R., Susilo, W., Plantard, T.: Device identification and personal data attestation in networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 9(4), 1\u201325 (2018)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"issue":"5","key":"4_CR10","doi-asserted-by":"publisher","first-page":"4088","DOI":"10.1109\/JIOT.2018.2849007","volume":"5","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Quan, W., Wang, T., Wang, Y.: Delay-constrained utility maximization for video ads push in mobile opportunistic D2D networks. IEEE Internet Things J. 5(5), 4088\u20134099 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"4_CR11","first-page":"54","volume":"8","author":"I Kotenko","year":"2018","unstructured":"Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile Internet of Things security monitoring. J. Internet Serv. Inf. Secur. (JISIS) 8(3), 54\u201363 (2018)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Salleras, X., Signorini, M., Waisbard, E.: A blockchain-based trust system for the Internet of Things. In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, pp. 77\u201383. ACM (2018)","DOI":"10.1145\/3205977.3205993"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.comnet.2017.03.015","volume":"129","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Xu, C., Zhan, Y., Liu, Z., Guan, J., Zhang, H.: Incentive mechanism for computation offloading using edge computing: a Stackelberg game approach. Comput. Netw. 129, 399\u2013409 (2017)","journal-title":"Comput. Netw."},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1800175","volume":"33","author":"S Yao","year":"2018","unstructured":"Yao, S., Guan, J., Yan, Z., Xu, K.: SI-STIN: a smart identifier framework for space and terrestrial integrated network. IEEE Netw. 33(1), 8\u201314 (2018)","journal-title":"IEEE Netw."},{"issue":"1","key":"4_CR15","first-page":"4","volume":"9","author":"P Moriano","year":"2018","unstructured":"Moriano, P., Pendleton, J., Rich, S., Camp, L.J.: Stopping the insider at the gates: protecting organizational assets through graph mining. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 9(1), 4\u201329 (2018)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"issue":"4","key":"4_CR16","first-page":"1","volume":"8","author":"MNS Perera","year":"2018","unstructured":"Perera, M.N.S., Koshiba, T.: Achieving strong security and member registration for lattice-based group signature scheme with verifier-local revocation. J. Internet Serv. Inf. Secur. (JISIS) 8(4), 1\u201315 (2018)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"2","key":"4_CR17","first-page":"33","volume":"8","author":"F Valenza","year":"2018","unstructured":"Valenza, F., Lioy, A.: User-oriented network security policy specification. J. Internet Serv. Inf. Secur. (JISIS) 8(2), 33\u201347 (2018)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"2","key":"4_CR18","first-page":"84","volume":"3","author":"MS Aldo","year":"2013","unstructured":"Aldo, M.S.: Strategic role engineering approach to visual role based access control (V-RBAC). Int. J. Comput. Appl. Eng. Sci. 3(2), 84 (2013)","journal-title":"Int. J. Comput. Appl. Eng. Sci."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Narouei, M., Takabi, H.: Towards an automatic top-down role engineering approach using natural language processing techniques. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pp. 157\u2013160. ACM (2015)","DOI":"10.1145\/2752952.2752958"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Roeckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In: Proceedings of the Fifth ACM Workshop on Role-Based Access Control, pp. 103\u2013110. ACM (2000)","DOI":"10.1145\/344287.344308"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: Proceedings of the 12th ACM symposium on Access Control Models and Technologies, pp. 175\u2013184. ACM (2007)","DOI":"10.1145\/1266840.1266870"},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191\u2013233 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"5","key":"4_CR23","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1049\/iet-ifs.2016.0258","volume":"11","author":"B Mitra","year":"2017","unstructured":"Mitra, B., Sural, S., Vaidya, J., Atluri, V.: Migrating from RBAC to temporal RBAC. IET Inf. Secur. 11(5), 294\u2013300 (2017)","journal-title":"IET Inf. Secur."},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-39256-6_5","volume-title":"Data and Applications Security and Privacy XXVII","author":"B Mitra","year":"2013","unstructured":"Mitra, B., Sural, S., Atluri, V., Vaidya, J.: Toward mining of temporal roles. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 65\u201380. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39256-6_5"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Pan, N., Sun, L., Zhu, Z., He, L.: A temporal approximation-based role mining approach for TRBAC. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 2366\u20132370. IEEE (2017)","DOI":"10.1109\/CompComm.2017.8322958"},{"issue":"4","key":"4_CR26","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2445566.2445567","volume":"15","author":"M Frank","year":"2013","unstructured":"Frank, M., Buhman, J.M., Basin, D.: Role mining with probabilistic models. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(4), 15 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"4","key":"4_CR27","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.dss.2010.08.022","volume":"50","author":"A Colantonio","year":"2011","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4), 715\u2013731 (2011)","journal-title":"Decis. Support Syst."},{"issue":"6","key":"4_CR28","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TKDE.2011.37","volume":"24","author":"A Colantonio","year":"2011","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Visual role mining: a picture is worth a thousand roles. IEEE Trans. Knowl. Data Eng. 24(6), 1120\u20131133 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"4_CR29","doi-asserted-by":"publisher","first-page":"5301","DOI":"10.1109\/TVT.2016.2616034","volume":"66","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Wu, H., Xia, Y., Wang, Y., Li, F., Yang, P.: Optimal online data dissemination for resource constrained mobile opportunistic networks. IEEE Trans. Veh. Technol. 66(6), 5301\u20135315 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Ma, X., Li, R., Lu, Z.: Role mining based on weights. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 65\u201374. ACM (2010)","DOI":"10.1145\/1809842.1809854"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Frank, M., Streich, A.P., Basin, D., Buhmann, J.M.: A probabilistic approach to hybrid role mining. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 101\u2013111. ACM (2009)","DOI":"10.1145\/1653662.1653675"},{"issue":"5","key":"4_CR32","first-page":"951","volume":"50","author":"Z Zhai","year":"2013","unstructured":"Zhai, Z., Wang, J., Cao, Z., Mao, Y.: Hybrid role mining methods with minimal perturbation (in Chinese). J. Comput. Res. Dev. 50(5), 951\u2013960 (2013)","journal-title":"J. Comput. Res. Dev."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Fuchs, L., Meier, S.: The role mining process model-underlining the need for a comprehensive research perspective. In: 2011 Sixth International Conference on Availability, Reliability and Security, pp. 35\u201342. IEEE (2011)","DOI":"10.1109\/ARES.2011.12"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Molloy, I., Li, N., Qi, Y.A., Lobo, J., Dickens, L.: Mining roles with noisy data. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 45\u201354. ACM (2010)","DOI":"10.1145\/1809842.1809852"},{"issue":"3","key":"4_CR35","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TDSC.2008.61","volume":"7","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset enumeration. IEEE Trans. Dependable Secure Comput. 7(3), 300\u2013314 (2008)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Takabi, H., Joshi, J.B.D.: StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 55\u201364. ACM (2010)","DOI":"10.1145\/1809842.1809853"},{"issue":"5","key":"4_CR37","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.cose.2010.01.001","volume":"29","author":"A Colantonio","year":"2010","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Taming role mining complexity in RBAC. Comput. Secur. 29(5), 548\u2013564 (2010)","journal-title":"Comput. Secur."},{"issue":"4","key":"4_CR38","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1880022.1880030","volume":"13","author":"I Molloy","year":"2010","unstructured":"Molloy, I., et al.: Mining roles with multiple objectives. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 36 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Guo, Q., Vaidya, J., Atluri, V.: The role hierarchy mining problem: discovery of optimal role hierarchies. In: 2008 Annual Computer Security Applications Conference (ACSAC), pp. 237\u2013246. IEEE (2008)","DOI":"10.1109\/ACSAC.2008.38"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Genetic algorithms for role mining problem. In: 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing, pp. 646\u2013650. IEEE (2011)","DOI":"10.1109\/PDP.2011.63"},{"issue":"12","key":"4_CR41","doi-asserted-by":"publisher","first-page":"2678","DOI":"10.1109\/TIFS.2016.2594137","volume":"11","author":"L Dong","year":"2016","unstructured":"Dong, L., Wu, K., Tang, G.: A data-centric approach to quality estimation of role mining results. IEEE Trans. Inf. Forensics Secur. 11(12), 2678\u20132692 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., Lobo, J.: Evaluating role mining algorithms. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 95\u2013104. ACM (2009)","DOI":"10.1145\/1542207.1542224"},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.physa.2018.05.052","volume":"507","author":"L Wu","year":"2018","unstructured":"Wu, L., et al.: Uniform-scale assessment of role minimization in bipartite networks and its application to access control. Phys. A: Stat. Mech. Applications. 507, 381\u2013397 (2018)","journal-title":"Phys. A: Stat. Mech. Applications."},{"key":"4_CR44","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-642-01244-0_33","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"A Colantonio","year":"2009","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: A probabilistic bound on the basic role mining problem and its applications. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIPAICT, vol. 297, pp. 376\u2013386. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01244-0_33"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S.: A simple role mining algorithm. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1958\u20131962. ACM (2010)","DOI":"10.1145\/1774088.1774503"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Huang, H., Shang, F., Zhang, J.: Approximation algorithms for minimizing the number of roles and administrative assignments in RBAC. In: 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, pp. 427\u2013432. IEEE (2012)","DOI":"10.1109\/COMPSACW.2012.81"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining parameterized role-based policies. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 255\u2013266. ACM (2013)","DOI":"10.1145\/2435349.2435384"},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Molloy, I., et al.: Mining roles with semantic meanings. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 21\u201330. ACM (2008)","DOI":"10.1145\/1377836.1377840"},{"key":"4_CR49","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.future.2014.10.018","volume":"55","author":"W Ye","year":"2016","unstructured":"Ye, W., Li, R., Gu, X., Li, Y., Wen, K.: Role mining using answer set programming. Future Gener. Comput. Syst. 55, 336\u2013343 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR50","doi-asserted-by":"publisher","first-page":"40389","DOI":"10.1109\/ACCESS.2017.2782838","volume":"6","author":"N Pan","year":"2017","unstructured":"Pan, N., Sun, L., He, L.-S., Zhu, Z.-Q.: An approach for hierarchical RBAC reconfiguration with minimal perturbation. IEEE Access 6, 40389\u201340399 (2017)","journal-title":"IEEE Access"},{"key":"4_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2871148","volume":"48","author":"B Mitra","year":"2016","unstructured":"Mitra, B., Sural, S., Vaidya, J., Atluri, V.: A survey of role mining. ACM Comput. Surv. 48, 1\u201337 (2016)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"4_CR52","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1658377.1658381","volume":"28","author":"M Rosen-Zvi","year":"2010","unstructured":"Rosen-Zvi, M., Chemudugunta, C., Griffiths, T., Smyth, P., Steyvers, M.: Learning author-topic models from text corpora. ACM Trans. Inf. Syst. (TOIS) 28(1), 4 (2010)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Molloy, I., Park, Y., Chari, S.: Generative models for access control policies: applications to role mining over logs with attribution. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 45\u201356. ACM (2012)","DOI":"10.1145\/2295136.2295145"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, X., Han, W., Fang, Z., Yin, Y., Mustafa, H.: Role mining algorithm evaluation and improvement in large volume android applications. In: Proceedings of the First International Workshop on Security in Embedded Systems and Smartphones, pp. 19\u201326. ACM (2013)","DOI":"10.1145\/2484417.2484423"},{"key":"4_CR55","doi-asserted-by":"crossref","unstructured":"Alohaly, M., Takabi, H., Blanco, E.: A deep learning approach for extracting attributes of ABAC policies. In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, pp. 137\u2013148. ACM (2018)","DOI":"10.1145\/3205977.3205984"},{"key":"4_CR56","doi-asserted-by":"crossref","unstructured":"Morisset, C., Willemse, T.A.C., Zannone, N.: Efficient extended ABAC evaluation. In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, pp. 149\u2013160. ACM (2018)","DOI":"10.1145\/3205977.3205980"},{"key":"4_CR57","doi-asserted-by":"crossref","unstructured":"Colombo, P., Ferrari, E.: Access control in the era of big data: state of the art and research directions. In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, 13\u201315 June 2018, pp. 185\u2013192 (2018)","DOI":"10.1145\/3205977.3205998"},{"key":"4_CR58","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.future.2019.03.031","volume":"97","author":"J Guan","year":"2019","unstructured":"Guan, J., Sharma, V., You, I., Atiquzzaman, M., Imran, M.: Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover. Future Gener. Comp. Syst. 97, 775\u2013791 (2019)","journal-title":"Future Gener. Comp. Syst."},{"key":"4_CR59","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Rajtmajer, S.M., Zannone, N.: Multi-party access control: requirements, state of the art and open challenges. In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, 13\u201315 June 2018, p. 49 (2018)","DOI":"10.1145\/3205977.3205999"},{"key":"4_CR60","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-981-10-7850-7_12","volume-title":"Mobile Internet Security","author":"B Liu","year":"2018","unstructured":"Liu, B., Guan, J., Jiang, Z.: A policy management system based on multi-dimensional attribution label. In: You, I., Leu, F.-Y., Chen, H.-C., Kotenko, I. (eds.) MobiSec 2016. CCIS, vol. 797, pp. 128\u2013142. Springer, Singapore (2018). \nhttps:\/\/doi.org\/10.1007\/978-981-10-7850-7_12"},{"key":"4_CR61","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Biehl, J.T., Curry, C.: Sensing or watching?: balancing utility and privacy in sensing systems via collection and enforcement mechanisms. In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, 13\u201315 June 2018, pp. 105\u2013116 (2018)","DOI":"10.1145\/3205977.3205983"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9609-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T11:05:43Z","timestamp":1604228743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9609-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811596087","9789811596094"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9609-4_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}