{"id":"https://openalex.org/W2197800877","doi":"https://doi.org/10.1145/2841113.2841121","title":"Towards Managed Role Explosion","display_name":"Towards Managed Role Explosion","publication_year":2015,"publication_date":"2015-09-08","ids":{"openalex":"https://openalex.org/W2197800877","doi":"https://doi.org/10.1145/2841113.2841121","mag":"2197800877"},"language":"en","primary_location":{"id":"doi:10.1145/2841113.2841121","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2841113.2841121","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003927425","display_name":"Aaron Elliott","orcid":null},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Aaron Elliott","raw_affiliation_strings":["Royal Military College of Canada, Kingston, Ontario"],"affiliations":[{"raw_affiliation_string":"Royal Military College of Canada, Kingston, Ontario","institution_ids":["https://openalex.org/I51768193"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030947655","display_name":"Scott Knight","orcid":null},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Scott Knight","raw_affiliation_strings":["Royal Military College of Canada, Kingston, Ontario"],"affiliations":[{"raw_affiliation_string":"Royal Military College of Canada, Kingston, Ontario","institution_ids":["https://openalex.org/I51768193"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5003927425"],"corresponding_institution_ids":["https://openalex.org/I51768193"],"apc_list":null,"apc_paid":null,"fwci":4.0986,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.94302821,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"100","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.9536234736442566},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9168586730957031},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8104017972946167},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7637770771980286},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6582907438278198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47354477643966675},{"id":"https://openalex.org/keywords/decoupling","display_name":"Decoupling (probability)","score":0.42091476917266846},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2828916013240814},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08932214975357056}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.9536234736442566},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9168586730957031},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8104017972946167},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7637770771980286},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6582907438278198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47354477643966675},{"id":"https://openalex.org/C205606062","wikidata":"https://www.wikidata.org/wiki/Q5249645","display_name":"Decoupling (probability)","level":2,"score":0.42091476917266846},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2828916013240814},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08932214975357056},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2841113.2841121","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2841113.2841121","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 New Security Paradigms Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1492608959","https://openalex.org/W1498957540","https://openalex.org/W1920330819","https://openalex.org/W1997862012","https://openalex.org/W2021549041","https://openalex.org/W2073442260","https://openalex.org/W2092064278","https://openalex.org/W2096814801","https://openalex.org/W2107988260","https://openalex.org/W2124126209","https://openalex.org/W2128361829","https://openalex.org/W2145793726","https://openalex.org/W2166029049","https://openalex.org/W2166602595","https://openalex.org/W2749040653","https://openalex.org/W2985318238","https://openalex.org/W4211218509"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W2358774039","https://openalex.org/W1513229083","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2374393728","https://openalex.org/W2124367090"],"abstract_inverted_index":{"Role-based":[0],"access":[1,82,91,119],"control":[2,83],"(RBAC)":[3],"is":[4,128],"a":[5,73,112],"popular":[6],"framework":[7],"for":[8,116],"securing":[9],"information":[10],"systems":[11,30],"in":[12,34,57],"medium":[13],"to":[14,72,99,120],"large":[15],"organizations":[16],"with":[17],"hundreds":[18],"or":[19,45],"thousands":[20],"of":[21,27,50,77,142],"employees.":[22],"However,":[23],"very":[24],"few":[25],"descriptions":[26],"existing":[28],"RBAC":[29,64,78],"can":[31],"be":[32],"found":[33,56,66],"the":[35,42,48,54,63,102,140],"literature.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40,61,86,106,123],"challenge":[41],"belief,":[43],"notion":[44],"sense":[46],"that":[47],"number":[49],"subjects":[51],"far":[52],"exceeds":[53],"roles":[55],"enterprise":[58],"systems.":[59],"First,":[60],"analyze":[62],"system":[65],"at":[67,130,139],"ACME":[68,89,131],"University,":[69],"comparing":[70],"it":[71],"recently":[74],"introduced":[75],"fragment":[76],"called":[79],"bi-sorted":[80],"role-based":[81],"(RB\u00c4C).":[84],"Then":[85],"investigate":[87],"how":[88,125],"performs":[90],"management,":[92],"using":[93],"our":[94,108],"new":[95,113],"hierarchical":[96],"graphing":[97],"model":[98],"better":[100],"visualize":[101],"subject-permission":[103],"mappings.":[104],"Next,":[105],"present":[107],"results":[109],"and":[110,136],"introduce":[111],"role-centric":[114],"methodology":[115],"dynamically":[117],"constraining":[118],"information.":[121],"Finally,":[122],"describe":[124],"organizational":[126],"scalability":[127],"enhanced":[129],"University":[132],"by":[133],"decoupling":[134],"subject":[135],"permission":[137],"management":[138],"expense":[141],"managed":[143],"role":[144],"explosion.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
