R. S. Sandhu, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

E. J. Coyne, Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1995.
DOI : 10.1145/270152.270159

M. P. Gallagher, A. O-'connor, and B. Kropp, The economic impact of role-based access control. Planning report 02-1, National Institute of Standards and Technology, 2002.

H. Roeckle, G. Schimpf, and R. Weidinger, Process-oriented approach for role-finding to implement role-based security administraiton in a large industrial organization, 2000.

G. Neumann and M. Strembeck, A scenario-driven role engineering process for functional RBAC roles, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507717

J. Schlegelmilch and U. Steffens, Role mining with ORCA, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005.
DOI : 10.1145/1063979.1064008

J. Vaidya, V. Atluri, and J. Warner, RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006.
DOI : 10.1145/1180405.1180424

J. Vaidya, V. Atluri, Q. Guo, and H. Lu, Edge-RMP: Minimizing administrative assignments for role-based access control, Journal of Computer Security, vol.17, issue.2, pp.211-235, 2009.
DOI : 10.3233/JCS-2009-0341

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining roles with semantic meanings, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.21-30, 2008.
DOI : 10.1145/1377836.1377840

D. Zhang, K. Ramamohanarao, and T. Ebringer, Role engineering using graph optimisation, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.139-144, 2007.
DOI : 10.1145/1266840.1266862

A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. S. Reiber et al., Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008.
DOI : 10.1145/1377836.1377838

J. Vaidya, V. Atluri, Q. Guo, and N. Adam, Migrating to optimal RBAC with minimal perturbation, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008.
DOI : 10.1145/1377836.1377839

Q. Guo, J. Vaidya, and V. Atluri, The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.237-246, 2008.
DOI : 10.1109/ACSAC.2008.38

H. Lu, J. Vaidya, and V. Atluri, Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, 2008.
DOI : 10.1109/ICDE.2008.4497438

M. Frank, A. P. Streich, D. Basin, and J. M. Buhmann, A probabilistic approach to hybrid role mining, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.101-111, 2009.
DOI : 10.1145/1653662.1653675

L. Fuchs and G. Pernul, HyDRo ??? Hybrid Development of Roles, Lecture Notes in Computer Science, vol.38, issue.2, pp.287-302, 2008.
DOI : 10.1007/978-3-642-56927-2

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007.
DOI : 10.1145/1266840.1266870

J. Vaidya, V. Atluri, J. Warner, and Q. Guo, Role Engineering via Prioritized Subset Enumeration, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.3
DOI : 10.1109/TDSC.2008.61

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, ACM Transactions on Information and System Security, vol.13, issue.3
DOI : 10.1145/1805974.1805983