access control; data security; privacy preserving control; conditional role mining problem