{"id":"https://openalex.org/W3153696031","doi":"https://doi.org/10.1145/3445970.3451154","title":"A Scalable Role Mining Approach for Large Organizations","display_name":"A Scalable Role Mining Approach for Large Organizations","publication_year":2021,"publication_date":"2021-04-10","ids":{"openalex":"https://openalex.org/W3153696031","doi":"https://doi.org/10.1145/3445970.3451154","mag":"3153696031"},"language":"en","primary_location":{"id":"doi:10.1145/3445970.3451154","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3445970.3451154","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3445970.3451154","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3445970.3451154","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066259015","display_name":"Masoumeh Abolfathi","orcid":"https://orcid.org/0000-0002-1669-7426"},"institutions":[{"id":"https://openalex.org/I921990950","display_name":"University of Colorado Denver","ror":"https://ror.org/02hh7en24","country_code":"US","type":"education","lineage":["https://openalex.org/I921990950"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Masoumeh Abolfathi","raw_affiliation_strings":["University of Colorado, Denver, Denver, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Denver, Denver, CO, USA","institution_ids":["https://openalex.org/I921990950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006947229","display_name":"Zohreh Raghebi","orcid":null},"institutions":[{"id":"https://openalex.org/I921990950","display_name":"University of Colorado Denver","ror":"https://ror.org/02hh7en24","country_code":"US","type":"education","lineage":["https://openalex.org/I921990950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zohreh Raghebi","raw_affiliation_strings":["University of Colorado, Denver, Denver, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Denver, Denver, CO, USA","institution_ids":["https://openalex.org/I921990950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036137099","display_name":"Haadi Jafarian","orcid":null},"institutions":[{"id":"https://openalex.org/I921990950","display_name":"University of Colorado Denver","ror":"https://ror.org/02hh7en24","country_code":"US","type":"education","lineage":["https://openalex.org/I921990950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haadi Jafarian","raw_affiliation_strings":["University of Colorado, Denver, Denver, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Denver, Denver, CO, USA","institution_ids":["https://openalex.org/I921990950"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007232242","display_name":"Farnoush Banaei\u2010Kashani","orcid":"https://orcid.org/0000-0003-4102-9873"},"institutions":[{"id":"https://openalex.org/I921990950","display_name":"University of Colorado Denver","ror":"https://ror.org/02hh7en24","country_code":"US","type":"education","lineage":["https://openalex.org/I921990950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farnoush Banaei-Kashani","raw_affiliation_strings":["University of Colorado, Denver, Denver, CO, USA"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Denver, Denver, CO, USA","institution_ids":["https://openalex.org/I921990950"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066259015"],"corresponding_institution_ids":["https://openalex.org/I921990950"],"apc_list":null,"apc_paid":null,"fwci":1.4519,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85824758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8981859683990479},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.8724395036697388},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8461171388626099},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7387303709983826},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6423147916793823},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.6133955717086792},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5531187057495117},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4297376275062561},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3638402819633484},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3547351360321045}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8981859683990479},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.8724395036697388},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8461171388626099},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7387303709983826},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6423147916793823},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.6133955717086792},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5531187057495117},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4297376275062561},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3638402819633484},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3547351360321045},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3445970.3451154","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3445970.3451154","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3445970.3451154","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3445970.3451154","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3445970.3451154","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3445970.3451154","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3153696031.pdf","grobid_xml":"https://content.openalex.org/works/W3153696031.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W167995079","https://openalex.org/W805665992","https://openalex.org/W1506871974","https://openalex.org/W1902027874","https://openalex.org/W1968110920","https://openalex.org/W1981986848","https://openalex.org/W1987971958","https://openalex.org/W1996881001","https://openalex.org/W1998208223","https://openalex.org/W2000107752","https://openalex.org/W2001847277","https://openalex.org/W2015653806","https://openalex.org/W2017288758","https://openalex.org/W2054075152","https://openalex.org/W2066127983","https://openalex.org/W2078812535","https://openalex.org/W2107801860","https://openalex.org/W2111699416","https://openalex.org/W2121122425","https://openalex.org/W2131782448","https://openalex.org/W2141752622","https://openalex.org/W2154537314","https://openalex.org/W2161358272","https://openalex.org/W2163328802","https://openalex.org/W2164673530","https://openalex.org/W2323952706","https://openalex.org/W2917974002","https://openalex.org/W2949419148","https://openalex.org/W2990138404","https://openalex.org/W3005320064","https://openalex.org/W3029579966","https://openalex.org/W3143596294","https://openalex.org/W4242680284","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W1513229083","https://openalex.org/W2358774039","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2374393728","https://openalex.org/W2124367090"],"abstract_inverted_index":{"Role-based":[0],"access":[1,17,46,73,182],"control":[2,47,74,183],"(RBAC)":[3],"model":[4,37,190],"has":[5],"gained":[6],"significant":[7],"attention":[8],"in":[9,11,64,87],"cybersecurity":[10],"recent":[12],"years.":[13],"RBAC":[14],"restricts":[15],"system":[16],"only":[18],"to":[19,41,50,82,132,150,172,193],"authorized":[20],"users":[21],"based":[22],"on":[23,110],"the":[24,71,88,104,134,161,196,200],"roles":[25,67],"and":[26,33,163,185],"regulations":[27],"within":[28],"an":[29],"organization.":[30],"The":[31],"flexibility":[32],"usability":[34],"of":[35],"this":[36,53,84,122,139],"have":[38,79],"encouraged":[39],"organizations":[40],"migrate":[42],"from":[43,70,93],"traditional":[44],"discretionary":[45],"(DAC)":[48],"models":[49],"RBAC.":[51],"However,":[52],"transition":[54],"requires":[55],"accomplishing":[56],"a":[57,126,143,152,169],"very":[58],"challenging":[59],"task":[60],"called":[61],"role":[62,135],"mining":[63,136],"which":[65],"users'":[66],"are":[68],"generated":[69],"existing":[72],"lists.":[75],"Although":[76],"various":[77,181],"approaches":[78],"been":[80],"proposed":[81,189],"address":[83],"NP-complete":[85],"problem":[86],"literature,":[89],"they":[90,108],"suffer":[91],"either":[92],"low":[94,114],"scalability":[95],"such":[96],"that":[97,116,187],"their":[98],"execution":[99],"time":[100],"increases":[101],"exponentially":[102],"with":[103,113,204],"input":[105],"size,":[106],"or":[107],"rely":[109],"fast":[111],"heuristics":[112],"optimality":[115],"generate":[117],"too":[118],"many":[119],"roles.":[120],"In":[121],"paper,":[123],"we":[124,141,167],"introduce":[125],"highly":[127],"scalable":[128],"yet":[129],"optimal":[130],"approach":[131],"tackle":[133],"problem.":[137],"To":[138],"end,":[140],"utilize":[142],"non-negative":[144],"rank":[145],"reduced":[146],"matrix":[147],"decomposition":[148],"method":[149],"decompose":[151],"large-scale":[153],"user-permission":[154,201],"assignment":[155],"into":[156,176],"two":[157],"constitutive":[158],"components,":[159],"i.e.":[160],"user-role":[162],"role-permission":[164],"assignments.":[165],"Then,":[166],"apply":[168],"thresholding":[170],"technique":[171],"convert":[173],"real-valued":[174],"components":[175],"binary-valued":[177],"factors.":[178],"We":[179],"employ":[180],"configurations":[184],"demonstrate":[186],"our":[188],"is":[191],"able":[192],"effectively":[194],"discover":[195],"latent":[197],"relationship":[198],"behind":[199],"data":[202],"even":[203],"large":[205],"datasets.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
