Han, D.-j., Zhuo, H.-k., Xia, L.-t., and Li, L. (2012). Per-
mission and role automatic assigning of user in role-
based access control. Journal of Central South Uni-
versity, 19:1049–1056.
Hingankar, M. and Sural, S. (2011). Towards role min-
ing with restricted user-role assignment. In 2nd Int.
Conf. on Wireless Communication, Vehicular Tech-
nology, Information Theory and Aerospace Electronic
Systems Technology.
Huang, C., Sun, J.-l., Wang, X.-y., and Si, Y.-j. (2010).
Minimal role mining method for web service compo-
sition. Journal of Zhejiang University SCIENCE C,
11(5):328–339.
Huang, H., Shang, F., and Zhang, J. (2012). Approximation
algorithms for minimizing the number of roles and ad-
ministrative assignments in rbac. In 36th Annual Com-
puter Software and Applications Conf. Workshops.
IEEE.
Jafari, M., Chinaei, A., Barker, K., and Fathian, M. (2009).
Role mining in access history logs. Journal of Infor-
mation Assurance and Security, 38.
John, J., Sural, S., Atluri, V., and Vaidya, J. (2012). Role
mining under role-usage cardinality constraint. In In-
formation Security and Privacy Research, volume 376
of IFIP Advances in Information and Communication
Technology, pages 150–161. Springer.
Kumar, R., Sural, S., and Gupta, A. (2011). Mining rbac
roles under cardinality constraint. In Information Sys-
tems Security, pages 171–185. Springer.
Levy, Y. and Ellis, T. J. (2006). A Systems Approach to
Conduct an Effective Literature Review in Support
of Information Systems Research. Informing Science
Journal, 9:181–212.
Li, R., Wang, W., Ma, X., Gu, X., and Wen, K. (2012). Min-
ing roles using attributes of permissions. Int. Jour-
nal of Innovative Computing, Information and Con-
trol, 8(11):7909–7924.
Lu, H., Hong, Y., Yang, Y., Duan, L., and Badar, N. (2013).
Towards user-oriented rbac model. In Data and Ap-
plications Security and Privacy XXVII, volume 7964
of Lecture Notes in Computer Science, pages 81–96.
Springer.
Lu, H., Vaidya, J., and Atluri, V. (2008). Optimal boolean
matrix decomposition: Application to role engineer-
ing. In Proc. of the 24th IEEE Int. Conf. on Data En-
gineering. IEEE.
Lu, H., Vaidya, J., Atluri, V., and Hong, Y. (2012).
Constraint-aware role mining via extended boolean
matrix decomposition. IEEE Transactions on De-
pendable and Secure Computing, 9(5):655–669.
Ma, X., Li, R., and Lu, Z. (2010). Role mining based on
weights. In Proc. of the 15th Symp. on Access Control
Models and Technologies. ACM.
Ma, X., Li, R., Lu, Z., and Wang, W. (2012). Mining con-
straints in role-based access control. Mathematical
and Computer Modelling, 55(1):87–96.
Ma, X., Tian, Y., Zhao, L., and Li, R. (2013). Mining role
based on ranks. ICIC Express Letters. Part B, Ap-
plications: an Int. Journal of Research and Surveys,
4(2):319–326.
Mandala, S., Vukovic, M., Laredo, J., Ruan, Y., and Her-
nandez, M. (2012). Hybrid role mining for security
service solution. In Proc. of the 9th Int. Conf. on Ser-
vices Computing. IEEE.
Mitra, B., Sural, S., Atluri, V., and Vaidya, J. (2013). To-
ward mining of temporal roles. In Data and Ap-
plications Security and Privacy XXVII, volume 7964
of Lecture Notes in Computer Science, pages 65–80.
Springer.
Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E.,
Calo, S., and Lobo, J. (2008). Mining roles with se-
mantic meanings. In Proc. of the 13th Symp. on Access
Control Models and Technologies. ACM.
Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E.,
Calo, S., and Lobo, J. (2010). Mining roles with mul-
tiple objectives. In ACM Transactions on Information
and System Security. ACM.
Molloy, I., Park, Y., and Chari, S. (2012). Generative mod-
els for access control policies: Applications to role
mining over logs with attribution. In Proc. of the 17th
Symp. on Access Control Models and Technologies.
ACM.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
Schlegelmilch, J. and Steffens, U. (2005). Role mining with
orca. In Proc. of the 10th Symp. on AccessControl
Models and Technologies. ACM.
SOX (2002). Sarbanes-oxley act of 2002, pl 107-204, 116
stat 745.
Takabi, H. and Joshi, J. B. (2010). Stateminer: An efficient
similarity-based approach for optimal mining of role
hierarchy. In Proc. of the 15th Symp. on Access Con-
trol Models and Technologies. ACM.
Uzun, E., Atluri, V., Lu, H., and Vaidya, J. (2011). An opti-
mization model for the extended role mining problem.
In Data and Applications Security and Privacy XXV,
pages 76–89. Springer.
Vaidya, J., Atluri, V., and Guo, Q. (2007). The role mining
problem: finding a minimal descriptive set of roles. In
Proc. of the 12th Symp. on Access Control models and
Technologies. ACM.
Vaidya, J., Atluri, V., and Guo, Q. (2010a). The role mining
problem: A formal perspective. ACM Transactions on
Information and System Security, 13(3):27.
Vaidya, J., Atluri, V., and Warner, J. (2006). Roleminer:
Mining roles using subset enumeration. In Proc. of the
13th ACM Conf. on Computer and Communications
Security. ACM.
Vaidya, J., Atluri, V., Warner, J., and Guo, Q. (2010b). Role
engineering via prioritized subset enumeration. IEEE
Transactions on Dependable and Secure Computing,
7(3):300–314.
Wang, J., Zeng, C., He, C., Hong, L., Zhou, L., Wong,
R. K., and Tian, J. (2012). Context-aware role min-
ing for mobile service recommendation. In Proc. of
the 27th Annual Symp. on Applied Computing. ACM.
Wong, R. K., Chu, V. W., Hao, T., and Wang, J. (2012).
Context-aware service recommendation for moving
AnalyzingQualityCriteriainRole-basedIdentityandAccessManagement
71