{"id":"https://openalex.org/W1990671692","doi":"https://doi.org/10.2478/v10065-010-0060-6","title":"Modelling role hierarchy structure using the Formal Concept Analysis","display_name":"Modelling role hierarchy structure using the Formal Concept Analysis","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1990671692","doi":"https://doi.org/10.2478/v10065-010-0060-6","mag":"1990671692"},"language":"en","primary_location":{"id":"doi:10.2478/v10065-010-0060-6","is_oa":true,"landing_page_url":"https://doi.org/10.2478/v10065-010-0060-6","pdf_url":"https://journals.umcs.pl/ai/article/download/3292/2486","source":{"id":"https://openalex.org/S4210184648","display_name":"Annales Universitatis Mariae Curie-Sklodowska sectio AI \u2013 Informatica","issn_l":"1732-1360","issn":["1732-1360","2083-3628"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annales UMCS, Informatica","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://journals.umcs.pl/ai/article/download/3292/2486","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030719344","display_name":"\u015acib\u00f3r Sobieski","orcid":"https://orcid.org/0000-0002-5260-7571"},"institutions":[{"id":"https://openalex.org/I34250744","display_name":"University of \u0141\u00f3d\u017a","ror":"https://ror.org/05cq64r17","country_code":"PL","type":"education","lineage":["https://openalex.org/I34250744"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"\u015acibor Sobieski","raw_affiliation_strings":["Department of Theoretical Physics II, University of L\u00f3d\u017a, ul. Pomorska 149/153, 90-236 \u0141\u00f3d\u017a, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Theoretical Physics II, University of L\u00f3d\u017a, ul. Pomorska 149/153, 90-236 \u0141\u00f3d\u017a, Poland#TAB#","institution_ids":["https://openalex.org/I34250744"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005999171","display_name":"Bartosz Zieli\u0144ski","orcid":"https://orcid.org/0000-0003-3534-6012"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bartosz Zieli\u0144ski","raw_affiliation_strings":["Department of Theoretical Physics II, University of L\u00f3d\u017a, ul. Pomorska 149/153, 90-236 \u0141\u00f3d\u017a, Poland","Institute of Mathematics, PAN, ul. \u015aniadeckich 8, 00-956 Warszawa, Poland"],"affiliations":[{"raw_affiliation_string":"Department of Theoretical Physics II, University of L\u00f3d\u017a, ul. Pomorska 149/153, 90-236 \u0141\u00f3d\u017a, Poland","institution_ids":[]},{"raw_affiliation_string":"Institute of Mathematics, PAN, ul. \u015aniadeckich 8, 00-956 Warszawa, Poland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030719344"],"corresponding_institution_ids":["https://openalex.org/I34250744"],"apc_list":null,"apc_paid":null,"fwci":1.8643,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.89502726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"10","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10215","display_name":"Semantic Web and Ontologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.8883610367774963},{"id":"https://openalex.org/keywords/formal-concept-analysis","display_name":"Formal concept analysis","score":0.7754720449447632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5875784754753113},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5453183650970459},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5090636610984802},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.42862385511398315},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.37246978282928467},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28533560037612915},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15833592414855957},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13028845191001892},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.12000101804733276},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08215802907943726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0801800787448883}],"concepts":[{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.8883610367774963},{"id":"https://openalex.org/C76363472","wikidata":"https://www.wikidata.org/wiki/Q1437394","display_name":"Formal concept analysis","level":2,"score":0.7754720449447632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5875784754753113},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5453183650970459},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5090636610984802},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.42862385511398315},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37246978282928467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28533560037612915},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15833592414855957},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13028845191001892},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.12000101804733276},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08215802907943726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0801800787448883},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.2478/v10065-010-0060-6","is_oa":true,"landing_page_url":"https://doi.org/10.2478/v10065-010-0060-6","pdf_url":"https://journals.umcs.pl/ai/article/download/3292/2486","source":{"id":"https://openalex.org/S4210184648","display_name":"Annales Universitatis Mariae Curie-Sklodowska sectio AI \u2013 Informatica","issn_l":"1732-1360","issn":["1732-1360","2083-3628"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annales UMCS, Informatica","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.2478/v10065-010-0060-6","is_oa":true,"landing_page_url":"https://doi.org/10.2478/v10065-010-0060-6","pdf_url":"https://journals.umcs.pl/ai/article/download/3292/2486","source":{"id":"https://openalex.org/S4210184648","display_name":"Annales Universitatis Mariae Curie-Sklodowska sectio AI \u2013 Informatica","issn_l":"1732-1360","issn":["1732-1360","2083-3628"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annales UMCS, Informatica","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1990671692.pdf","grobid_xml":"https://content.openalex.org/works/W1990671692.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1503729935","https://openalex.org/W1531115460","https://openalex.org/W1553406086","https://openalex.org/W1851672339","https://openalex.org/W2005293072","https://openalex.org/W2045150700","https://openalex.org/W2070016387","https://openalex.org/W2080421718","https://openalex.org/W2093397547","https://openalex.org/W2100059775","https://openalex.org/W2166602595","https://openalex.org/W2396903734","https://openalex.org/W3102845218","https://openalex.org/W4206790557","https://openalex.org/W4255318870","https://openalex.org/W4300885858","https://openalex.org/W6668316325","https://openalex.org/W6764000109"],"related_works":["https://openalex.org/W2495844640","https://openalex.org/W2365264209","https://openalex.org/W2509431957","https://openalex.org/W2026999166","https://openalex.org/W97952580","https://openalex.org/W3020924181","https://openalex.org/W2885881666","https://openalex.org/W1992685502","https://openalex.org/W4211007821","https://openalex.org/W1990671692"],"abstract_inverted_index":{"We":[0,28],"demonstrate":[1],"how":[2],"one":[3],"can":[4],"use":[5],"the":[6,13,17,23,36],"formal":[7],"concept":[8],"analysis":[9],"(FCA)":[10],"to":[11],"obtain":[12],"role":[14,18],"hierarchy":[15],"for":[16],"based":[19],"access":[20,25],"control":[21,26],"from":[22],"existing":[24],"matrix.":[27],"also":[29],"discuss":[30],"assesed":[31],"by":[32],"means":[33],"of":[34,38],"FCA":[35],"quality":[37],"security":[39],"system":[40],"and":[41],"finding":[42],"users":[43],"with":[44],"excess":[45],"permissions.":[46]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
