{"id":"https://openalex.org/W2126829624","doi":"https://doi.org/10.1109/nss.2009.76","title":"On Role Mappings for RBAC-Based Secure Interoperation","display_name":"On Role Mappings for RBAC-Based Secure Interoperation","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2126829624","doi":"https://doi.org/10.1109/nss.2009.76","mag":"2126829624"},"language":"en","primary_location":{"id":"doi:10.1109/nss.2009.76","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nss.2009.76","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Third International Conference on Network and System Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102372527","display_name":"Jinwei Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinwei Hu","raw_affiliation_strings":["Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","Intell. & Distrib. Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Intell. & Distrib. Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039670436","display_name":"Ruixuan Li","orcid":"https://orcid.org/0000-0002-7791-5511"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruixuan Li","raw_affiliation_strings":["Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","Intell. & Distrib. Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Intell. & Distrib. Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109895617","display_name":"Zhengding Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengding Lu","raw_affiliation_strings":["Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","Intell. & Distrib. Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Intell. & Distrib. Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102372527"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":4.8766,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95061341,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"277"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperation","display_name":"Interoperation","score":0.9967834949493408},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.9374328851699829},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7698068618774414},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7638704776763916},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6064640879631042},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.601250410079956},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5788706541061401},{"id":"https://openalex.org/keywords/separation-of-duties","display_name":"Separation of duties","score":0.47166240215301514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44891270995140076},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4113861322402954},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3413742780685425},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3219413757324219},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23997914791107178},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1611984670162201},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08493152260780334}],"concepts":[{"id":"https://openalex.org/C139458680","wikidata":"https://www.wikidata.org/wiki/Q12184942","display_name":"Interoperation","level":3,"score":0.9967834949493408},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.9374328851699829},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7698068618774414},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7638704776763916},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6064640879631042},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.601250410079956},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5788706541061401},{"id":"https://openalex.org/C100587491","wikidata":"https://www.wikidata.org/wiki/Q1474665","display_name":"Separation of duties","level":4,"score":0.47166240215301514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44891270995140076},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4113861322402954},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3413742780685425},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3219413757324219},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23997914791107178},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1611984670162201},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08493152260780334},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nss.2009.76","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nss.2009.76","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Third International Conference on Network and System Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W53342935","https://openalex.org/W1549044518","https://openalex.org/W1559155956","https://openalex.org/W1997862012","https://openalex.org/W2011039300","https://openalex.org/W2018891043","https://openalex.org/W2021079739","https://openalex.org/W2022309237","https://openalex.org/W2024785973","https://openalex.org/W2050272710","https://openalex.org/W2061406556","https://openalex.org/W2078838100","https://openalex.org/W2103674110","https://openalex.org/W2120202959","https://openalex.org/W2124364990","https://openalex.org/W2128361829","https://openalex.org/W2131322727","https://openalex.org/W2133359410","https://openalex.org/W2140965492","https://openalex.org/W2152505375","https://openalex.org/W2152717486","https://openalex.org/W2154765153","https://openalex.org/W2155117159","https://openalex.org/W2156885966","https://openalex.org/W2159055115","https://openalex.org/W2161358272","https://openalex.org/W2166602595","https://openalex.org/W2340406763","https://openalex.org/W2476096155","https://openalex.org/W6602238972","https://openalex.org/W6658618318","https://openalex.org/W6679485946","https://openalex.org/W6683219676"],"related_works":["https://openalex.org/W2361825345","https://openalex.org/W2945232779","https://openalex.org/W2056139315","https://openalex.org/W2354790132","https://openalex.org/W2393886221","https://openalex.org/W2378809132","https://openalex.org/W2751035473","https://openalex.org/W1606180331","https://openalex.org/W2354055181","https://openalex.org/W2938177213"],"abstract_inverted_index":{"The":[0,49],"inter-domain":[1],"role":[2,19,39,55],"mapping":[3],"is":[4,36,52,160,208],"a":[5,101,195],"basic":[6],"method":[7],"for":[8,106],"facilitating":[9],"interoperation":[10,112,139,144],"in":[11,45],"RBAC-based":[12],"collaborating":[13],"environments,":[14],"where":[15],"each":[16],"domain":[17],"employs":[18],"based":[20],"access":[21,26],"control":[22,27],"(RBAC)":[23],"to":[24,30,37,53,80,99,110,154,168,179,184,202],"specify":[25],"policies.":[28],"Prior":[29],"concrete":[31],"interoperation,":[32],"one":[33,51,162],"important":[34],"problem":[35,166],"establish":[38],"mappings.":[40,82],"Two":[41],"issues":[42],"are":[43,77,122,131,149,190],"involved":[44],"the":[46,69,91,158,165,169],"establishing":[47],"process.":[48],"first":[50],"generate":[54,81],"mappings":[56,107],"while":[57],"respecting":[58],"RBAC":[59,75,203],"states":[60,204],"such":[61],"as":[62,210],"separation":[63],"of":[64,74,103,119,128,164],"duty":[65],"(SoD)":[66],"constraints.":[67],"On":[68],"other":[70],"hand,":[71],"administrative":[72,147,156,199],"works":[73,148],"policies":[76],"sometimes":[78],"needed":[79],"This":[83],"paper":[84],"investigates":[85],"these":[86,129],"two":[87],"problems,":[88],"mostly":[89],"from":[90],"computational":[92],"perspective.":[93],"In":[94],"particular,":[95],"we":[96,151],"study":[97],"how":[98,109,153,198],"find":[100],"set":[102,171],"roles":[104],"appropriate":[105],"and":[108,136],"fulfill":[111],"requests;":[113],"it":[114],"turns":[115],"out":[116],"that":[117,161,177],"most":[118],"corresponding":[120],"problems":[121,130],"NP-complete.":[123],"Further,":[124],"several":[125],"useful":[126],"subcases":[127],"identified.":[132],"We":[133,175],"also":[134],"motivate":[135],"support":[137],"partial":[138],"by":[140],"imposing":[141],"constraints":[142],"on":[143,197],"requests.":[145],"When":[146],"necessary,":[150],"examine":[152],"minimize":[155],"cost;":[157],"result":[159],"subcase":[163],"reduces":[167],"\"minimal":[170],"cover\"":[172],"(MSC)":[173],"problem.":[174],"demonstrate":[176],"approaches":[178],"MSC":[180],"can":[181],"be":[182],"applied":[183],"this":[185],"problem,":[186],"even":[187],"though":[188],"they":[189],"not":[191],"totally":[192],"equivalent.":[193],"Finally,":[194],"discussion":[196],"operations":[200],"made":[201],"may":[205],"influence":[206],"interoperability":[207],"presented":[209],"well.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
