{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:19:58Z","timestamp":1759133998779,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133624","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"181-192","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Role engineering"],"prefix":"10.1145","author":[{"given":"Nino Vincenzo","family":"Verde","sequence":"first","affiliation":[{"name":"University of Roma Tre, Rome, Italy"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Vijay","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Alessandro","family":"Colantonio","sequence":"additional","affiliation":[{"name":"Bay31 GmbH, Zug, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Information Technology -- Role Based Access Control","author":"CITS","year":"2004","unstructured":"ANSI\/IN CITS 359--2004 , Information Technology -- Role Based Access Control , 2004 . ANSI\/INCITS 359--2004, Information Technology -- Role Based Access Control, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1363686.1364198"},{"key":"e_1_3_2_1_3_1","volume-title":"Role Mining in Business-Taming Role-Based Access Control Administration","author":"Colantonio A.","year":"2011","unstructured":"A. Colantonio , R. Di Pietro , and A. Ocello . Role Mining in Business-Taming Role-Based Access Control Administration . World Scientific Publishing Co. Inc , 2011 . A. Colantonio, R. Di Pietro, and A. Ocello. Role Mining in Business-Taming Role-Based Access Control Administration. World Scientific Publishing Co. Inc, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1774088.1774304"},{"key":"e_1_3_2_1_5_1","series-title":"IFIP International Federation for Information Processing","first-page":"19","volume-title":"Proc. IFIP SEC","author":"Colantonio A.","year":"2010","unstructured":"A. Colantonio , R. Di Pietro , A. Ocello , and N. V. Verde . Mining business-relevant RBAC states through decomposition . In Proc. IFIP SEC , volume 330 of IFIP International Federation for Information Processing , pages 19 -- 30 . Springer , 2010 . A. Colantonio, R. Di Pietro, A. Ocello, and N. V. Verde. Mining business-relevant RBAC states through decomposition. In Proc. IFIP SEC, volume 330 of IFIP International Federation for Information Processing, pages 19--30. Springer, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.cose.2010.01.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.dss.2010.08.022"},{"key":"e_1_3_2_1_8_1","article-title":"Visual role mining: A picture is worth a thousand roles","author":"Colantonio A.","year":"2011","unstructured":"A. Colantonio , R. Di Pietro , A. Ocello , and N. V. Verde . Visual role mining: A picture is worth a thousand roles . IEEE Transactions on Knowledge and Data Engineering, 99(PrePrints) , 2011 . To appear. A. Colantonio, R. Di Pietro, A. Ocello, and N. V. Verde. Visual role mining: A picture is worth a thousand roles. IEEE Transactions on Knowledge and Data Engineering, 99(PrePrints), 2011. To appear.","journal-title":"IEEE Transactions on Knowledge and Data Engineering, 99(PrePrints)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/270152.270159"},{"key":"e_1_3_2_1_10_1","volume-title":"Role Engineering for Enterprise Security Management","author":"Coyne E. J.","year":"2007","unstructured":"E. J. Coyne and J. M. Davis . Role Engineering for Enterprise Security Management . Artech House , Dec. 2007 . E. J. Coyne and J. M. Davis. Role Engineering for Enterprise Security Management. Artech House, Dec. 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1377836.1377838"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1653662.1653675"},{"key":"e_1_3_2_1_13_1","volume-title":"Data Mining: Concepts and Techniques. Morgan Kaufmann","author":"Han J.","year":"2006","unstructured":"J. Han and M. Kamber . Data Mining: Concepts and Techniques. Morgan Kaufmann , 2 nd edition, 2006 . J. Han and M. Kamber. Data Mining: Concepts and Techniques. Morgan Kaufmann, 2nd edition, 2006.","edition":"2"},{"key":"e_1_3_2_1_14_1","volume-title":"Etude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin del la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles, 37:547--579","author":"Jaccard P.","year":"1901","unstructured":"P. Jaccard . Etude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin del la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles, 37:547--579 , 1901 . P. Jaccard. Etude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin del la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles, 37:547--579, 1901."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","author":"Kaufman L.","year":"1990","unstructured":"L. Kaufman and P. J. Rousseeuw . Finding Groups in Data: An Introduction to Cluster Analysis . John Wiley , 1990 . L. Kaufman and P. J. Rousseeuw. Finding Groups in Data: An Introduction to Cluster Analysis. John Wiley, 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/775412.775435"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ICDE.2008.4497438"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1542207.1542224"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/507711.507717"},{"key":"e_1_3_2_1_20_1","volume-title":"2010 economic analysis of role-based access control. Technical report","author":"O'Connor A. C.","year":"2010","unstructured":"A. C. O'Connor and R. J. Loomis . 2010 economic analysis of role-based access control. Technical report , National Institute of Standards and Technology (NIST) , 2010 . A. C. O'Connor and R. J. Loomis. 2010 economic analysis of role-based access control. Technical report, National Institute of Standards and Technology (NIST), 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/344287.344308"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1063979.1064008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1266840.1266870"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1377836.1377839"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1180405.1180424"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1080\/0094965031000136012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/TKDE.2005.60"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1266840.1266862"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.5555\/1370684.1370685"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY'12","name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA"},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2133601.2133624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2133601.2133624"}},"subtitle":["from theory to practice"],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":29,"alternative-id":["10.1145\/2133601.2133624","10.1145\/2133601"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2133601.2133624","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}