{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T12:07:50Z","timestamp":1743336470644,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970033","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes"],"prefix":"10.1145","author":[{"given":"Igor","family":"Saenko","sequence":"first","affiliation":[{"name":"St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), St. Petersburg, Russia"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[{"name":"St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS),, St. Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809851"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5120\/7438-0267"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2011.63"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2012.31"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2015.069291"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774503"},{"volume-title":"Proceedings of the 24th IFIP TC 11 International Information Security Conference (Pafos, Cyprus, May 18-20, 2009). SEC 2009, IFIP Advances in Information and Communication Technology, 297","author":"Colantonio A.","key":"e_1_3_2_1_10_1","unstructured":"Colantonio , A. , Di Pietro , R. , Ocello , A. , and Verde , N.V . 2009. A Probabilistic Bound on the Basic Role Mining Problem and its Applications . In Proceedings of the 24th IFIP TC 11 International Information Security Conference (Pafos, Cyprus, May 18-20, 2009). SEC 2009, IFIP Advances in Information and Communication Technology, 297 , 376--386. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-01244-0_33. 10.1007\/978-3-642-01244-0_33 Colantonio, A., Di Pietro, R., Ocello, A., and Verde, N.V. 2009. A Probabilistic Bound on the Basic Role Mining Problem and its Applications. In Proceedings of the 24th IFIP TC 11 International Information Security Conference (Pafos, Cyprus, May 18-20, 2009). SEC 2009, IFIP Advances in Information and Communication Technology, 297, 376--386. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-01244-0_33."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445567"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 27th Annual IFIP WG 11.3 Conference","author":"Lu H.","year":"2013","unstructured":"Lu , H. , Hong , Y. , Yang , Y. , Duan , L. , and Badar , N . 2013. Towards User-Oriented RBAC Model . In Proceedings of the 27th Annual IFIP WG 11.3 Conference ( Newark, NJ, USA , July 15-17, 2013 ). DBSec 2013, Springer, LNCS, 7964, 107--129. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-39256-6_6. 10.1007\/978-3-642-39256-6_6 Lu, H., Hong, Y., Yang, Y., Duan, L., and Badar, N. 2013. Towards User-Oriented RBAC Model. In Proceedings of the 27th Annual IFIP WG 11.3 Conference (Newark, NJ, USA, July 15-17, 2013). DBSec 2013, Springer, LNCS, 7964, 107--129. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-39256-6_6."},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Multi-Assignment Clustering for Boolean Data","volume":"13","author":"Frank M.","year":"2012","unstructured":"Frank , M. , Streich , A.P. , and Basin , D. 2012 . Multi-Assignment Clustering for Boolean Data . In The Journal of Machine Learning Research , 13 , 1 (Jan. 2012), 459--489. Frank, M., Streich, A.P., and Basin, D. 2012. Multi-Assignment Clustering for Boolean Data. In The Journal of Machine Learning Research, 13, 1 (Jan. 2012), 459--489.","journal-title":"The Journal of Machine Learning Research"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364198"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542224"},{"key":"e_1_3_2_1_17_1","first-page":"258","article-title":"Role Mining in Access History Logs","volume":"1","author":"Jafari M.","year":"2009","unstructured":"Jafari , M. , Chinaei , A.H. , Barker , K. , and Fathian , M. 2009 . Role Mining in Access History Logs . In International Journal of Computer Information Systems and Industrial Management Applications , 1 , 1 (2009), 258 -- 265 . Jafari, M., Chinaei, A.H., Barker, K., and Fathian, M. 2009. Role Mining in Access History Logs. In International Journal of Computer Information Systems and Industrial Management Applications, 1, 1 (2009), 258--265.","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 25th Annual IFIP WG 11.3 Conference","author":"Uzun E.","year":"2011","unstructured":"Uzun , E. , Atluri , V. , Lu , H. , and Vaidya , J . 2011. An Optimization Model for the Extended Role Mining Problem . In Proceedings of the 25th Annual IFIP WG 11.3 Conference ( Richmond, VA, USA , July 11-13, 2011 ). DBSec 2011, Springer, LNCS, 6818, 76--89. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-22348-8_8. 10.1007\/978-3-642-22348-8_8 Uzun, E., Atluri, V., Lu, H., and Vaidya, J. 2011. An Optimization Model for the Extended Role Mining Problem. In Proceedings of the 25th Annual IFIP WG 11.3 Conference (Richmond, VA, USA, July 11-13, 2011). DBSec 2011, Springer, LNCS, 6818, 76--89. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-22348-8_8."},{"key":"e_1_3_2_1_19_1","volume-title":"Constrained Role Mining. In Security and Trust Management. Proceedings of the 8th International Workshop","author":"Blundo C.","year":"2012","unstructured":"Blundo , C. and Cimato , S . 2012 . Constrained Role Mining. In Security and Trust Management. Proceedings of the 8th International Workshop ( Pisa, Italy , September 13-14, 2012 ), Revised Selected Papers. STM 2012, Springer, LNCS, 7783, 289--304. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-38004-4_19. 10.1007\/978-3-642-38004-4_19 Blundo, C. and Cimato, S. 2012. Constrained Role Mining. In Security and Trust Management. Proceedings of the 8th International Workshop (Pisa, Italy, September 13-14, 2012), Revised Selected Papers. STM 2012, Springer, LNCS, 7783, 289--304. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-38004-4_19."}],"event":{"name":"PrAISe '16: International Workshop on AI for Privacy and Security","acronym":"PrAISe '16","location":"The Hague Netherlands"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T05:34:05Z","timestamp":1673674445000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":19,"alternative-id":["10.1145\/2970030.2970033","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970033","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}