{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:16:10Z","timestamp":1768515370389,"version":"3.49.0"},"reference-count":20,"publisher":"Wiley","issue":"13","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":259,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61173170"],"award-info":[{"award-number":["61173170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61433006"],"award-info":[{"award-number":["61433006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm. Networks"],"published-print":{"date-parts":[[2015,9,10]]},"DOI":"10.1002\/sec.1177","type":"journal-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T16:04:10Z","timestamp":1418745850000},"page":"2317-2328","source":"Crossref","is-referenced-by-count":11,"title":["Role mining based on permission cardinality constraint and user cardinality constraint"],"prefix":"10.1002","volume":"8","author":[{"given":"Xiaopu","family":"Ma","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology; Huazhong University of Science and Technology; Wuhan Hubei 430074 China"},{"name":"School of Computer and Information Technology; Nanyang Normal University; Nanyang Henan 473061 China"}]},{"given":"Ruixuan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology; Huazhong University of Science and Technology; Wuhan Hubei 430074 China"}]},{"given":"Hongwei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Automation; Huazhong University of Science and Technology; Wuhan Hubei 430074 China"}]},{"given":"Huaqing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology; Huazhong University of Science and Technology; Wuhan Hubei 430074 China"}]}],"member":"311","published-online":{"date-parts":[[2014,12,16]]},"reference":[{"issue":"3","key":"10.1002\/sec.1177-BIB0001|sec1177-cit-0001","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","article-title":"Proposed NIST standard for role-based access control","volume":"4","author":"Ferraiolo","year":"2001","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1002\/sec.1177-BIB0002|sec1177-cit-0002","unstructured":"Coyne EJ Role engineering New York, USA 1995"},{"key":"10.1002\/sec.1177-BIB0003|sec1177-cit-0003","doi-asserted-by":"crossref","unstructured":"Fernadez EB Hawkins JC Determining role rights from use cases New York, USA 1997 121 125","DOI":"10.1145\/266741.266767"},{"key":"10.1002\/sec.1177-BIB0004|sec1177-cit-0004","doi-asserted-by":"crossref","unstructured":"Anne B Mark S Stefanie RM Deriving role engineering artifacts from business processes and scenario models New York, USA 2011 11 20","DOI":"10.1145\/1998441.1998445"},{"key":"10.1002\/sec.1177-BIB0005|sec1177-cit-0005","doi-asserted-by":"crossref","unstructured":"Xiaopu M Ruixuan L Zhengding L Role mining based on weights PA, USA 2010 65 74","DOI":"10.1145\/1809842.1809854"},{"key":"10.1002\/sec.1177-BIB0006|sec1177-cit-0006","doi-asserted-by":"crossref","unstructured":"Molloy I Chen H Li T Mining roles with semantic meanings Colorado, USA 2008 21 30","DOI":"10.1145\/1377836.1377840"},{"key":"10.1002\/sec.1177-BIB0007|sec1177-cit-0007","doi-asserted-by":"crossref","unstructured":"Lu H Vaidya J Atluri V Optimal boolean matrix decomposition: application to role engineering Washington, USA 2008 297 306","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"10.1002\/sec.1177-BIB0008|sec1177-cit-0008","doi-asserted-by":"crossref","unstructured":"Vaidya J Atluri V Warner J Roleminer: mining roles using subset enumeration Alexandria, USA 2006 144 153","DOI":"10.1145\/1180405.1180424"},{"key":"10.1002\/sec.1177-BIB0009|sec1177-cit-0009","doi-asserted-by":"crossref","unstructured":"Zhang D Ramamohanarao K Versteeg S Graph based strategies to role engineering New York, USA 2010 1 4","DOI":"10.1145\/1852666.1852694"},{"key":"10.1002\/sec.1177-BIB0010|sec1177-cit-0010","doi-asserted-by":"crossref","unstructured":"Zhang D Ramamohanarao K Ebringer T Yann T Permission set mining: discovering practical and useful roles Washington, USA 2008 247 256","DOI":"10.1109\/ACSAC.2008.21"},{"issue":"1-2","key":"10.1002\/sec.1177-BIB0011|sec1177-cit-0011","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.mcm.2011.01.053","article-title":"Mining Constraints in role-based access control","volume":"55","author":"Xiaopu Ma","year":"2012","journal-title":"Mathematical and Computer Modelling"},{"issue":"2","key":"10.1002\/sec.1177-BIB0012|sec1177-cit-0012","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"10.1002\/sec.1177-BIB0013|sec1177-cit-0013","doi-asserted-by":"crossref","unstructured":"Kumar R Sural S Gupta A Mining RBAC roles under cardinality constraint Berlin, Heidelberg 2010 171 185","DOI":"10.1007\/978-3-642-17714-9_13"},{"key":"10.1002\/sec.1177-BIB0014|sec1177-cit-0014","doi-asserted-by":"crossref","unstructured":"Blundo C Cimato S Constrained role mining, ArXiv e-prints March 2012","DOI":"10.1007\/978-3-642-38004-4_19"},{"key":"10.1002\/sec.1177-BIB0015|sec1177-cit-0015","doi-asserted-by":"crossref","unstructured":"Hingankar M Sural S Towards role mining with restricted user-role assignment Chennai, India 2011 1 5","DOI":"10.1109\/WIRELESSVITAE.2011.5940855"},{"key":"10.1002\/sec.1177-BIB0016|sec1177-cit-0016","doi-asserted-by":"crossref","unstructured":"John CJ Sural S Atluri Vijayalakshmi Role mining under role-usage cardinality constraint 2012 150 161","DOI":"10.1007\/978-3-642-30436-1_13"},{"key":"10.1002\/sec.1177-BIB0017|sec1177-cit-0017","unstructured":"Harika P Negajyothi M John CJ Meeting cardinality constraints in role mining"},{"key":"10.1002\/sec.1177-BIB0018|sec1177-cit-0018","first-page":"655","article-title":"Constraint-aware role mining via extended boolean matrix decomposition","author":"Lu","year":"2012","journal-title":"IEEE TDSC"},{"key":"10.1002\/sec.1177-BIB0019|sec1177-cit-0019","doi-asserted-by":"crossref","unstructured":"Zhang D Ramamohanarao K Ebringer T Role engineering using graph optimisation Antipolis, France 2007 139 144","DOI":"10.1145\/1266840.1266862"},{"key":"10.1002\/sec.1177-BIB0020|sec1177-cit-0020","doi-asserted-by":"crossref","unstructured":"Frank M Buhmann JM Basin D On the definition of role mining PA, USA 2010 35 44","DOI":"10.1145\/1809842.1809851"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/sec.1177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T03:25:29Z","timestamp":1747193129000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1177"}},"subtitle":["Role mining based on permission cardinality constraint and user cardinality constraint"],"short-title":[],"issued":{"date-parts":[[2014,12,16]]},"references-count":20,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2015,9,10]]}},"URL":"https:\/\/doi.org\/10.1002\/sec.1177","relation":{},"ISSN":["1939-0114"],"issn-type":[{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2014,12,16]]}}}