{"id":"https://openalex.org/W2791324781","doi":"https://doi.org/10.1145/3093898","title":"Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks","display_name":"Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks","publication_year":2018,"publication_date":"2018-03-06","ids":{"openalex":"https://openalex.org/W2791324781","doi":"https://doi.org/10.1145/3093898","mag":"2791324781"},"language":"en","primary_location":{"id":"doi:10.1145/3093898","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3093898","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091857773","display_name":"Igor Saenko","orcid":"https://orcid.org/0000-0002-9051-5272"},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Igor Saenko","raw_affiliation_strings":["Saint-Petersburg Institute of Informatics and Automation of Russian Academy of Sciences, and St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Saint-Petersburg Institute of Informatics and Automation of Russian Academy of Sciences, and St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033986640","display_name":"Igor Kotenko","orcid":"https://orcid.org/0000-0001-6859-7120"},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Igor Kotenko","raw_affiliation_strings":["Saint-Petersburg Institute of Informatics and Automation of Russian Academy of Sciences, and St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Saint-Petersburg Institute of Informatics and Automation of Russian Academy of Sciences, and St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Russia","institution_ids":["https://openalex.org/I173089394"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091857773"],"corresponding_institution_ids":["https://openalex.org/I173089394"],"apc_list":null,"apc_paid":null,"fwci":0.602,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.77543557,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"18","issue":"3","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8839858174324036},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.869491457939148},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.68026202917099},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6710907220840454},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.6148873567581177},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5566368103027344},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5276913642883301},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5025286674499512},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4626657962799072},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3441545367240906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3297058939933777},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.18894270062446594},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1492612361907959},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1326395571231842}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8839858174324036},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.869491457939148},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.68026202917099},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6710907220840454},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.6148873567581177},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5566368103027344},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5276913642883301},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5025286674499512},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4626657962799072},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3441545367240906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3297058939933777},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.18894270062446594},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1492612361907959},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1326395571231842},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3093898","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3093898","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4399999976158142,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1460693889","display_name":null,"funder_award_id":"15-07-07451, 16-37-00338, 16-29-09482, 18-07-01488","funder_id":"https://openalex.org/F4320321079","funder_display_name":"Russian Foundation for Basic Research"},{"id":"https://openalex.org/G4915244950","display_name":null,"funder_award_id":"Grant 074-U01","funder_id":"https://openalex.org/F4320327649","funder_display_name":"ITMO University"}],"funders":[{"id":"https://openalex.org/F4320321079","display_name":"Russian Foundation for Basic Research","ror":"https://ror.org/02mh1ke95"},{"id":"https://openalex.org/F4320327649","display_name":"ITMO University","ror":"https://ror.org/04txgxn49"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W157251712","https://openalex.org/W329913983","https://openalex.org/W1561412617","https://openalex.org/W1577207041","https://openalex.org/W1984625316","https://openalex.org/W1986170391","https://openalex.org/W1986294018","https://openalex.org/W2002621549","https://openalex.org/W2019298113","https://openalex.org/W2040030596","https://openalex.org/W2043871181","https://openalex.org/W2043978338","https://openalex.org/W2045962819","https://openalex.org/W2070733414","https://openalex.org/W2073409053","https://openalex.org/W2097571405","https://openalex.org/W2098809455","https://openalex.org/W2099970928","https://openalex.org/W2107801860","https://openalex.org/W2110654099","https://openalex.org/W2110690829","https://openalex.org/W2123138012","https://openalex.org/W2125570197","https://openalex.org/W2137577559","https://openalex.org/W2141390398","https://openalex.org/W2154424679","https://openalex.org/W2161310377","https://openalex.org/W2161358272","https://openalex.org/W2166602595","https://openalex.org/W2243940629","https://openalex.org/W2255021838","https://openalex.org/W2511366626","https://openalex.org/W2527730699","https://openalex.org/W2561675875","https://openalex.org/W2585105539","https://openalex.org/W2943490696","https://openalex.org/W2950330862","https://openalex.org/W3023540311","https://openalex.org/W6606358983","https://openalex.org/W6836725202"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"To":[0],"create":[1,34],"solutions":[2],"for":[3,28,73],"providing":[4],"the":[5,23,48,53,56,114],"required":[6],"access":[7,61,88,136],"control":[8,62,87,137],"in":[9,22],"computer":[10],"networks":[11],"it":[12,128],"is":[13,31,98],"not":[14,100],"sufficient":[15],"to":[16,33,46,84,102,107,125,132],"have":[17],"only":[18,101],"tools":[19],"and":[20,69,120],"protocols":[21],"network":[24],"that":[25,127],"are":[26,67],"needed":[27],"it.":[29],"It":[30],"necessary":[32],"corresponding":[35],"configuration,":[36],"or":[37],"scheme,":[38,63],"of":[39,58,86,93,113,135,143],"such":[40],"tools,":[41],"which":[42],"will":[43],"allow":[44],"us":[45,124],"satisfy":[47],"existing":[49],"security":[50],"requirements.":[51],"At":[52],"same":[54],"time,":[55],"problems":[57],"creating":[59],"an":[60],"as":[64,109,139],"a":[65,81,149],"rule,":[66],"NP-complete":[68],"require":[70],"heuristic":[71],"models":[72],"their":[74,155],"solving.":[75],"In":[76],"this":[77],"article,":[78],"we":[79],"propose":[80],"unified":[82],"approach":[83,97,116],"creation":[85],"schemes,":[89],"based":[90],"on":[91,117,148],"usage":[92],"genetic":[94,145],"algorithms.":[95],"The":[96],"applied":[99,131],"original":[103],"schemes":[104,122,138],"configuration":[105],"but":[106],"reconfiguration":[108],"well.":[110,140],"Successful":[111],"testing":[112,142],"suggested":[115,144],"RBAC,":[118],"VLAN,":[119],"VPN":[121],"allows":[123],"suppose":[126],"may":[129],"be":[130],"other":[133],"types":[134],"Experimental":[141],"algorithms,":[146],"performed":[147],"specially":[150],"designed":[151],"test":[152],"bed,":[153],"showed":[154],"sufficiently":[156],"high":[157],"efficiency.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
