{"id":"https://openalex.org/W2674996434","doi":"https://doi.org/10.3233/jcs-140519","title":"Towards user-oriented RBAC model","display_name":"Towards user-oriented RBAC model","publication_year":2015,"publication_date":"2015-03-15","ids":{"openalex":"https://openalex.org/W2674996434","doi":"https://doi.org/10.3233/jcs-140519","mag":"2674996434"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-140519","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-140519","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060287641","display_name":"Haibing Lu","orcid":"https://orcid.org/0000-0003-0266-6191"},"institutions":[{"id":"https://openalex.org/I16269868","display_name":"Santa Clara University","ror":"https://ror.org/03ypqe447","country_code":"US","type":"education","lineage":["https://openalex.org/I16269868"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haibing Lu","raw_affiliation_strings":["Santa Clara University, Santa Clara, CA, USA. E-mail:\u00a0","Santa Clara University, Santa Clara, CA, USA. E-mail:\u00a0hlu@scu.edu"],"affiliations":[{"raw_affiliation_string":"Santa Clara University, Santa Clara, CA, USA. E-mail:\u00a0","institution_ids":["https://openalex.org/I16269868"]},{"raw_affiliation_string":"Santa Clara University, Santa Clara, CA, USA. E-mail:\u00a0hlu@scu.edu","institution_ids":["https://openalex.org/I16269868"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725148","display_name":"Yuan Hong","orcid":"https://orcid.org/0000-0003-4095-4506"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuan Hong","raw_affiliation_strings":["University at Albany \u2013 SUNY, Albany, NY, USA. E-mail:\u00a0","University at Albany \u2013 SUNY, Albany, NY, USA. E-mail:\u00a0hong@albany.edu"],"affiliations":[{"raw_affiliation_string":"University at Albany \u2013 SUNY, Albany, NY, USA. E-mail:\u00a0","institution_ids":["https://openalex.org/I392282"]},{"raw_affiliation_string":"University at Albany \u2013 SUNY, Albany, NY, USA. E-mail:\u00a0hong@albany.edu","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102279390","display_name":"Yanjiang Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yanjiang Yang","raw_affiliation_strings":["Institute for Infocomm Research, Singapore. E-mail:\u00a0","Institute for Infocomm Research, Singapore. E-mail:\u00a0yyang@i2r.a-star.edu.sg"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, Singapore. E-mail:\u00a0","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Institute for Infocomm Research, Singapore. E-mail:\u00a0yyang@i2r.a-star.edu.sg","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077625109","display_name":"Lian Duan","orcid":"https://orcid.org/0000-0002-0618-8628"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lian Duan","raw_affiliation_strings":["New Jersey Institute of Technology, Newark, NJ, USA. E-mail:\u00a0","New Jersey Institute of Technology, Newark, NJ, USA. E-mail:\u00a0lian.duan@njit.edu"],"affiliations":[{"raw_affiliation_string":"New Jersey Institute of Technology, Newark, NJ, USA. E-mail:\u00a0","institution_ids":["https://openalex.org/I118118575"]},{"raw_affiliation_string":"New Jersey Institute of Technology, Newark, NJ, USA. E-mail:\u00a0lian.duan@njit.edu","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025632737","display_name":"Nazia Badar","orcid":null},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nazia Badar","raw_affiliation_strings":["Rutgers University, Newark, NJ, USA. E-mail:\u00a0","Rutgers University, Newark, NJ, USA. E-mail:\u00a0nbadar@scarletmail.rutgers.edu"],"affiliations":[{"raw_affiliation_string":"Rutgers University, Newark, NJ, USA. E-mail:\u00a0","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Rutgers University, Newark, NJ, USA. E-mail:\u00a0nbadar@scarletmail.rutgers.edu","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060287641"],"corresponding_institution_ids":["https://openalex.org/I16269868"],"apc_list":null,"apc_paid":null,"fwci":11.2718,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.97941181,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"23","issue":"1","first_page":"107","last_page":"129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9718000292778015,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.9120265245437622},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7996805906295776},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.7000588178634644},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.6865849494934082},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6034746170043945},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4823009967803955},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.46698281168937683},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4426953196525574},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4294772744178772},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3802383244037628},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3411320447921753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2388642132282257},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17148125171661377},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14430952072143555},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09269377589225769},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07676351070404053}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.9120265245437622},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7996805906295776},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.7000588178634644},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.6865849494934082},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6034746170043945},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4823009967803955},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.46698281168937683},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4426953196525574},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4294772744178772},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3802383244037628},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3411320447921753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2388642132282257},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17148125171661377},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14430952072143555},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09269377589225769},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07676351070404053},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-140519","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-140519","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1506871974","https://openalex.org/W1595483292","https://openalex.org/W1596572207","https://openalex.org/W1728822020","https://openalex.org/W1966616869","https://openalex.org/W1979102635","https://openalex.org/W2000107752","https://openalex.org/W2001176075","https://openalex.org/W2014204110","https://openalex.org/W2040567316","https://openalex.org/W2043978338","https://openalex.org/W2054075152","https://openalex.org/W2066127983","https://openalex.org/W2107801860","https://openalex.org/W2131782448","https://openalex.org/W2138683527","https://openalex.org/W2141752622","https://openalex.org/W2145240016","https://openalex.org/W2149816156","https://openalex.org/W2150442700","https://openalex.org/W2158504322","https://openalex.org/W2158934828","https://openalex.org/W2160342152","https://openalex.org/W2161358272","https://openalex.org/W2162758782","https://openalex.org/W2163328802","https://openalex.org/W2164673530","https://openalex.org/W2167043381","https://openalex.org/W2295392890","https://openalex.org/W4233864942","https://openalex.org/W4248668129","https://openalex.org/W4252115301"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W2945232779","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W819284483"],"abstract_inverted_index":{"Role":[0],"mining":[1,31,122,146,151,165,223],"is":[2,50,61,102,212,243],"to":[3,8,62,71,76,104,108,117,119,206,225,229,254],"define":[4],"a":[5,69,91,124,185,203,214,239,246],"role":[6,30,65,75,85,121,145,150,160,164,173,200,207,222,250],"set":[7],"implement":[9],"the":[10,21,54,73,78,95,120,130,148,157,162,176,180,191,198,263],"role-based":[11],"access":[12],"control":[13],"(RBAC)":[14],"system":[15,48,101],"and":[16,24,67,87,175],"regarded":[17],"as":[18,147],"one":[19,42],"of":[20,59,133,179,188,234,265],"most":[22],"important":[23],"costliest":[25],"implementation":[26],"phases.":[27],"While":[28],"various":[29],"models":[32],"have":[33,156,170],"been":[34],"proposed,":[35],"we":[36,115,142,237],"find":[37],"that":[38,128],"user":[39,70,96,136,149],"experience/perception":[40],"\u2013":[41,49],"ultimate":[43],"goal":[44],"for":[45],"any":[46],"information":[47],"surprisingly":[51],"ignored":[52],"by":[53],"existing":[55,221],"works.":[56],"One":[57],"advantage":[58],"RBAC":[60,100],"support":[63],"multiple":[64],"assignments":[66,201],"allow":[68],"activate":[72],"necessary":[74],"perform":[77],"tasks":[79],"at":[80],"each":[81,135],"session.":[82],"However,":[83],"frequent":[84],"activating":[86],"deactivating":[88],"can":[89,137,169],"be":[90],"tendinous":[92],"thing":[93],"from":[94,190],"perspective.":[97],"A":[98],"user-friendly":[99],"expected":[103],"assign":[105],"few":[106],"roles":[107,134],"every":[109],"user.":[110],"So":[111],"in":[112,210],"this":[113,140],"paper":[114],"propose":[116],"incorporate":[118],"process":[123],"user-role":[125],"assignment":[126],"constraint":[127,196],"mandates":[129],"maximum":[131],"number":[132],"have.":[138],"Under":[139],"rationale,":[141],"formulate":[143],"user-oriented":[144],"problem,":[152,166],"where":[153,167],"all":[154],"users":[155,168],"same":[158],"maximal":[159,172,199],"assignments,":[161,174],"personalized":[163],"different":[171],"approximate":[177],"versions":[178],"two":[181],"problems,":[182],"which":[183,209,242],"tolerate":[184],"certain":[186],"amount":[187],"deviation":[189],"complete":[192],"reconstruction.":[193],"The":[194],"extra":[195],"on":[197,245,258],"poses":[202],"great":[204],"challenge":[205],"mining,":[208],"general":[211],"already":[213],"hard":[215],"problem.":[216],"We":[217],"examine":[218],"some":[219],"typical":[220],"methods":[224],"see":[226],"their":[227,235],"applicability":[228],"our":[230,255,266],"problems.":[231,256],"In":[232],"light":[233],"insufficiency,":[236],"present":[238],"new":[240],"algorithm,":[241],"based":[244],"novel":[247],"dynamic":[248],"candidate":[249],"generation":[251],"strategy,":[252],"tailored":[253],"Experiments":[257],"benchmark":[259],"data":[260],"sets":[261],"demonstrate":[262],"effectiveness":[264],"proposed":[267],"algorithm.":[268]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
