REFERENCES
Blundo, C. and Cimato, S. (2010). A simple role mining
algorithm. In Shin, S. Y., Ossowski, S., Schumacher,
M., Palakal, M. J., and Hung, C.-C., editors, Proceed-
ings of the 2010 ACM Symposium on Applied Com-
puting - SAC ’10, pages 1958–1962, New York, New
York, USA. ACM Press.
Colantonio, A., Di Pietro, R., and Ocello, A. (2008). A cost-
driven approach to role engineering. In Wainwright,
R. L. and Haddad, H. M., editors, Proceedings of the
2008 ACM symposium on Applied computing - SAC
’08, pages 2129–2136, New York, New York, USA.
ACM Press.
Dong, L., Wu, J., Gong, C., and Pi, B. (2014). A network-
cliques based role mining model. Journal of Net-
works, 9(8):2079–2088.
Dong, L. J., Wang, M. C., and Kang, X. J. (2011). Min-
ing least privilege roles by genetic algorithm. Applied
Mechanics and Materials, 121-126:4508–4512.
Du, X. and Chang, X. (2014). Performance of ai algo-
rithms for mining meaningful roles. In 2014 IEEE
Congress on Evolutionary Computation (CEC), pages
2070–2076. IEEE.
Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber,
R., and Tarjan, R. E. (2008). Fast exact and heuristic
methods for role minimization problems. In Ray, I.
and Li, N., editors, Proceedings of the 13th ACM sym-
posium on Access control models and technologies
- SACMAT ’08, pages 1–10, New York, New York,
USA. ACM Press.
Hu, N., Bradford, P. G., and Liu, J. (2006). Applying role
based access control and genetic algorithms to insider
threat detection. In Menezes, R., editor, Proceedings
of the 44th annual southeast regional conference on -
ACM-SE 44, pages 790–795, New York, New York,
USA. ACM Press.
Huang, H., Shang, F., Liu, J., and Du, H. (2015). Handling
least privilege problem and role mining in rbac. Jour-
nal of Combinatorial Optimization, 30(1):63–86.
Kotenko, I. and Saenko, I. (2015). Improved genetic al-
gorithms for solving the optimisation tasks for de-
sign of access control schemes in computer networks.
International Journal of Bio-Inspired Computation,
7(2):98–110.
Kuhlmann, M., Shohat, D., and Schimpf, G. (2003). Role
mining - revealing business roles for security admin-
istration using data mining technology. In Ferrari, E.
and Ferraiolo, D., editors, Proceedings of the eighth
ACM symposium on Access control models and tech-
nologies - SACMAT ’03, pages 179–186, New York,
New York, USA. ACM Press.
Kumar, R., Sural, S., and Gupta, A. (2010). Mining rbac
roles under cardinality constraint. In Jha, S. and
Mathuria, A., editors, Information Systems Security,
volume 6503 of Lecture Notes in Computer Science,
pages 171–185. Springer Berlin Heidelberg, Berlin,
Heidelberg.
Lu, H., Vaidya, J., and Atluri, V. (2008). Optimal boolean
matrix decomposition: Application to role engineer-
ing. In 2008 IEEE 24th International Conference on
Data Engineering, pages 297–306. IEEE.
Lu, H., Vaidya, J., and Atluri, V. (2014). An optimization
framework for role mining. Journal of Computer Se-
curity, 22(1):1–31.
Mitra, B., Sural, S., Vaidya, J., and Atluri, V. (2016). A
survey of role mining. ACM Computing Surveys,
48(4):1–37.
Molloy, I., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E.,
Calo, S., and Lobo, J. (2008). Mining roles with se-
mantic meanings. In Ray, I. and Li, N., editors, Pro-
ceedings of the 13th ACM symposium on Access con-
trol models and technologies - SACMAT ’08, pages
21–30, New York, New York, USA. ACM Press.
Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., and Lobo, J.
(2009). Evaluating role mining algorithms. In Carmi-
nati, B. and Joshi, J., editors, Proceedings of the 14th
ACM symposium on Access control models and tech-
nologies - SACMAT ’09, pages 95–104, New York,
New York, USA. ACM Press.
Saenko, I. and Kotenko, I. (2011). Genetic algorithms
for role mining problem. In 2011 19th International
Euromicro Conference on Parallel, Distributed and
Network-Based Processing, pages 646–650. IEEE.
Saenko, I. and Kotenko, I. (2012). Design and perfor-
mance evaluation of improved genetic algorithm for
role mining problem. In 2012 20th Euromicro In-
ternational Conference on Parallel, Distributed and
Network-based Processing, pages 269–274. IEEE.
Saenko, I. and Kotenko, I. (2016). Using genetic algorithms
for design and reconfiguration of rbac schemes. In
Unknown, editor, Proceedings of the 1st International
Workshop on AI for Privacy and Security - PrAISe ’16,
pages 1–9, New York, New York, USA. ACM Press.
Saenko, I. and Kotenko, I. (2017a). Administrating role-
based access control by genetic algorithms. In Un-
known, editor, Proceedings of the Genetic and Evo-
lutionary Computation Conference Companion on -
GECCO ’17, pages 1463–1470, New York, New York,
USA. ACM Press.
Saenko, I. and Kotenko, I. (2017b). Reconfiguration of rbac
schemes by genetic algorithms. In Badica, C., El Fal-
lah Seghrouchni, A., Beynier, A., Camacho, D., Herp-
son, C., Hindriks, K., and Novais, P., editors, Intelli-
gent Distributed Computing X, volume 678 of Studies
in Computational Intelligence, pages 89–98. Springer
International Publishing, Cham.
Saenko, I. and Kotenko, I. (2018). Genetic algorithms for
solving problems of access control design and recon-
figuration in computer networks. ACM Transactions
on Internet Technology, 18(3):1–21.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
Schlegelmilch, J. and Steffens, U. (2005). Role mining with
orca. In Ferrari, E. and Ahn, G.-J., editors, Proceed-
ings of the tenth ACM symposium on Access control
models and technologies - SACMAT ’05, pages 168–
176, New York, New York, USA. ACM Press.
The addRole-EA: A New Evolutionary Algorithm for the Role Mining Problem
165