Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints. Blundo, C., Cimato, S., & Siniscalchi, L. Comput. J., 65(6):1386–1411, 2022. Paper doi bibtex @article{DBLP:journals/cj/BlundoCS22,
author = {Carlo Blundo and
Stelvio Cimato and
Luisa Siniscalchi},
title = {Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints},
journal = {Comput. J.},
volume = {65},
number = {6},
pages = {1386--1411},
year = {2022},
url = {https://doi.org/10.1093/comjnl/bxaa186},
doi = {10.1093/COMJNL/BXAA186},
timestamp = {Mon, 04 Jul 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cj/BlundoCS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"TSsahqPpCfQDGJZ4o","bibbaseid":"blundo-cimato-siniscalchi-roleminingheuristicsforpermissionroleusagecardinalityconstraints-2022","author_short":["Blundo, C.","Cimato, S.","Siniscalchi, L."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Carlo"],"propositions":[],"lastnames":["Blundo"],"suffixes":[]},{"firstnames":["Stelvio"],"propositions":[],"lastnames":["Cimato"],"suffixes":[]},{"firstnames":["Luisa"],"propositions":[],"lastnames":["Siniscalchi"],"suffixes":[]}],"title":"Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints","journal":"Comput. J.","volume":"65","number":"6","pages":"1386–1411","year":"2022","url":"https://doi.org/10.1093/comjnl/bxaa186","doi":"10.1093/COMJNL/BXAA186","timestamp":"Mon, 04 Jul 2022 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/cj/BlundoCS22.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/cj/BlundoCS22,\n author = {Carlo Blundo and\n Stelvio Cimato and\n Luisa Siniscalchi},\n title = {Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints},\n journal = {Comput. J.},\n volume = {65},\n number = {6},\n pages = {1386--1411},\n year = {2022},\n url = {https://doi.org/10.1093/comjnl/bxaa186},\n doi = {10.1093/COMJNL/BXAA186},\n timestamp = {Mon, 04 Jul 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/cj/BlundoCS22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n","author_short":["Blundo, C.","Cimato, S.","Siniscalchi, L."],"key":"DBLP:journals/cj/BlundoCS22","id":"DBLP:journals/cj/BlundoCS22","bibbaseid":"blundo-cimato-siniscalchi-roleminingheuristicsforpermissionroleusagecardinalityconstraints-2022","role":"author","urls":{"Paper":"https://doi.org/10.1093/comjnl/bxaa186"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dltgroup.dmi.unipg.it/temp_files/global.bib","dataSources":["PCdRvyaDZRZMeqKhf"],"keywords":[],"search_terms":["role","mining","heuristics","permission","role","usage","cardinality","constraints","blundo","cimato","siniscalchi"],"title":"Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints","year":2022}