Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1995. ,
DOI : 10.1145/270152.270159
The economic impact of role-based access control. Planning report 02-1, National Institute of Standards and Technology, 2002. ,
Process-oriented approach for role-finding to implement role-based security administraiton in a large industrial organization, 2000. ,
A scenario-driven role engineering process for functional RBAC roles, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002. ,
DOI : 10.1145/507711.507717
Role mining with ORCA, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005. ,
DOI : 10.1145/1063979.1064008
RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006. ,
DOI : 10.1145/1180405.1180424
Edge-RMP: Minimizing administrative assignments for role-based access control, Journal of Computer Security, vol.17, issue.2, pp.211-235, 2009. ,
DOI : 10.3233/JCS-2009-0341
Mining roles with semantic meanings, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.21-30, 2008. ,
DOI : 10.1145/1377836.1377840
Role engineering using graph optimisation, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.139-144, 2007. ,
DOI : 10.1145/1266840.1266862
Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008. ,
DOI : 10.1145/1377836.1377838
Migrating to optimal RBAC with minimal perturbation, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008. ,
DOI : 10.1145/1377836.1377839
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.237-246, 2008. ,
DOI : 10.1109/ACSAC.2008.38
Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, 2008. ,
DOI : 10.1109/ICDE.2008.4497438
A probabilistic approach to hybrid role mining, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.101-111, 2009. ,
DOI : 10.1145/1653662.1653675
HyDRo ??? Hybrid Development of Roles, Lecture Notes in Computer Science, vol.38, issue.2, pp.287-302, 2008. ,
DOI : 10.1007/978-3-642-56927-2
The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007. ,
DOI : 10.1145/1266840.1266870
Role Engineering via Prioritized Subset Enumeration, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.3 ,
DOI : 10.1109/TDSC.2008.61
The role mining problem, ACM Transactions on Information and System Security, vol.13, issue.3 ,
DOI : 10.1145/1805974.1805983