{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:10:00Z","timestamp":1730319000189,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,15]],"date-time":"2017-07-15T00:00:00Z","timestamp":1500076800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"RSF","award":["15-11-30029"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,15]]},"DOI":"10.1145\/3067695.3082509","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"1463-1470","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Administrating role-based access control by genetic algorithms"],"prefix":"10.1145","author":[{"given":"Igor","family":"Saenko","sequence":"first","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St.Petersburg, Russia and St. Petersburg National Research University of Information Technologies, Kronverkskiy prospekt, St.Petersburg, Russia"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St.Petersburg, Russia and St. Petersburg National Research University of Information Technologies, Kronverkskiy prospekt, St.Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2017,7,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809851"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5120\/7438-0267"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2011.63"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2012.31"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2015.069291"},{"key":"e_1_3_2_2_8_1","volume-title":"Studies in Computational Intelligence","author":"Saenko I.","year":"2017","unstructured":"I. Saenko and I. Kotenko . 2017. Reconfiguration of RBAC schemes by genetic algorithms . In Studies in Computational Intelligence , Vol. 678 , Springer International Publishing ( 2017 ), 89--98. I.Saenko and I.Kotenko. 2017. Reconfiguration of RBAC schemes by genetic algorithms. In Studies in Computational Intelligence, Vol. 678, Springer International Publishing (2017), 89--98."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774503"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01244-0_33"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445567"},{"key":"e_1_3_2_2_14_1","first-page":"459","article-title":"Multi-assignment clustering for boolean data","volume":"13","author":"Frank M.","year":"2012","unstructured":"M. Frank , A.P. Streich , D. Basin , and J.M. Buhmann . 2012 . Multi-assignment clustering for boolean data . J. Mach. Learn. Res. 13 , 1 (2012), 459 -- 489 . M.Frank, A.P.Streich, D.Basin, and J.M.Buhmann. 2012. Multi-assignment clustering for boolean data. J. Mach. Learn. Res. 13, 1 (2012), 459--489.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364198"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970033"},{"issue":"1","key":"e_1_3_2_2_17_1","first-page":"258","article-title":"Role Mining in Access History Logs","volume":"1","author":"Jafari M.","year":"2009","unstructured":"M. Jafari , A.H. Chinaei , K. Barker , M. Fathian . 2009 . Role Mining in Access History Logs . International Journal of Computer Information Systems and Industrial Management Applications , Vol. 1 , No. 1 , 258 -- 265 . M.Jafari, A.H.Chinaei, K.Barker, M.Fathian. 2009. Role Mining in Access History Logs. International Journal of Computer Information Systems and Industrial Management Applications, Vol.1, No.1, 258--265.","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2029896.2029908"},{"key":"e_1_3_2_2_19_1","series-title":"Lecture Notes in Computer Science","volume-title":"Security and Trust Management","author":"Blundo C.","unstructured":"C. Blundo and S. Cimato . 2013. Constrained Role Mining . In Security and Trust Management , Lecture Notes in Computer Science , Vol. 7783 , Springer-Verlag , Berlin , 289--304. C.Blundo and S.Cimato. 2013. Constrained Role Mining. In Security and Trust Management, Lecture Notes in Computer Science, Vol. 7783, Springer-Verlag, Berlin, 289--304."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2014.0603"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185638"},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 2008 High Performance Computing & Simulation Conference (HPCS'08)","author":"Semmanche N.","year":"2008","unstructured":"N. Semmanche and S. Selka . 2008 . Access control of Web services using genetic algorithms . In Proceedings of the 2008 High Performance Computing & Simulation Conference (HPCS'08) , ECMS, Nicosia, Cyprus, 249--254. N.Semmanche and S.Selka. 2008. Access control of Web services using genetic algorithms. In Proceedings of the 2008 High Performance Computing & Simulation Conference (HPCS'08), ECMS, Nicosia, Cyprus, 249--254."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2003.811564"},{"key":"e_1_3_2_2_24_1","first-page":"4952","article-title":"Genetic Algorithm Based Intrusion Detection System","volume":"5","author":"Rai N.","year":"2014","unstructured":"N. Rai and K. Rai . 2014 . Genetic Algorithm Based Intrusion Detection System . International Journal of Computer Science and Information Technologies , 5 , 4 (2014), 4952 -- 4957 . N.Rai and K.Rai. 2014. Genetic Algorithm Based Intrusion Detection System. International Journal of Computer Science and Information Technologies, 5, 4 (2014), 4952--4957.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768430"}],"event":{"name":"GECCO '17: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Berlin Germany","acronym":"GECCO '17"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3067695.3082509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T17:10:10Z","timestamp":1673197810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3067695.3082509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,15]]},"references-count":25,"alternative-id":["10.1145\/3067695.3082509","10.1145\/3067695"],"URL":"https:\/\/doi.org\/10.1145\/3067695.3082509","relation":{},"subject":[],"published":{"date-parts":[[2017,7,15]]},"assertion":[{"value":"2017-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}