D. De-capitani, S. Vimercati, S. Foresti, P. Samarati, and S. Jajodia, Access control policies and languages, Int. J. Comput. Sci. Eng, vol.3, issue.2, pp.94-102, 2007.

E. J. Coyne, Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, pp.15-16, 1995.
DOI : 10.1145/270152.270159

E. J. Coyne and J. M. Davis, Role Engineering for Enterprise Security Management, 2007.

I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang et al., Evaluating role mining algorithms, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.95-104, 2009.
DOI : 10.1145/1542207.1542224

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.567.4536

A. Colantonio, D. Pietro, R. Ocello, A. Verde, and N. V. , A formal framework to elicit roles with business meaning in RBAC systems, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.85-94, 2009.
DOI : 10.1145/1542207.1542223

A. Colantonio, D. Pietro, R. Ocello, A. Verde, and N. V. , Taming role mining complexity in RBAC. Computers & Security Special Issue on " Challenges for Security, Privacy & Trust

A. Colantonio, D. Pietro, R. Ocello, A. Verde, and N. V. , A new role mining framework to elicit business roles and to mitigate enterprise risk. Decision Support Systems Special Issue on " Enterprise Risk and Security Management: Data, Text and Web Mining