Access control policies and languages, Int. J. Comput. Sci. Eng, vol.3, issue.2, pp.94-102, 2007. ,
Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, pp.15-16, 1995. ,
DOI : 10.1145/270152.270159
Role Engineering for Enterprise Security Management, 2007. ,
Evaluating role mining algorithms, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.95-104, 2009. ,
DOI : 10.1145/1542207.1542224
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.567.4536
A formal framework to elicit roles with business meaning in RBAC systems, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.85-94, 2009. ,
DOI : 10.1145/1542207.1542223
Taming role mining complexity in RBAC. Computers & Security Special Issue on " Challenges for Security, Privacy & Trust ,
A new role mining framework to elicit business roles and to mitigate enterprise risk. Decision Support Systems Special Issue on " Enterprise Risk and Security Management: Data, Text and Web Mining ,