K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, Verification and change-impact analysis of access-control policies, Proc. 27th International Conference on Software Engineering, pp.196-205, 2005.

G. Hughes and T. Bultan, Automated verification of access control policies, 2004.

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Proc. International Workshop on Policies for Distributed Systems and Networks, pp.18-38, 2001.
DOI : 10.1007/3-540-44569-2_2

E. Martin, J. Hwang, T. Xie, and V. Hu, Assessing Quality of Policy Properties in Verification of Access Control Policies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.163-172, 2008.
DOI : 10.1109/ACSAC.2008.48

R. Agrawal and R. Srikant, Fast algorithms for mining association rules in large databases, Proc. 20th International Conference on Very Large Data Bases, pp.487-499, 1994.

L. Bauer, S. Garriss, and M. K. Reiter, Detecting and resolving policy misconfigurations in access-control systems, Proc. 13th ACM Symposium on Access control Models and Technologies, pp.185-194, 2008.

E. Martin and T. Xie, Inferring Access-Control Policy Properties via Machine Learning, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), pp.235-238, 2006.
DOI : 10.1109/POLICY.2006.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.6815

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

C. Borgelt, Apriori -Association Rule Induction/Frequent Item Set Mining, 2009.

E. Martin and T. Xie, A fault model and mutation testing of access control policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.667-676, 2007.
DOI : 10.1145/1242572.1242663

S. D. Stoller, P. Yang, C. Ramakrishnan, and M. I. Gofman, Efficient policy analysis for administrative role based access control, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.445-455, 2007.
DOI : 10.1145/1315245.1315300