K. Appel and W. Haken, Every planar map is four colorable, Illinois Journal of Mathematics, vol.21, issue.3, pp.429-567, 1977.

V. Atluri, S. A. Chun, and P. Mazzoleni, A Chinese wall security model for decentralized workflow systems, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.48-57, 2001.
DOI : 10.1145/501983.501991

V. Atluri and J. Warner, Supporting conditional delegation in secure workflow management systems, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.49-58, 2005.
DOI : 10.1145/1063979.1063990

X. Bai, R. Gopal, M. Nunez, and D. Zhdanov, On the Prevention of Fraud and Privacy Exposure in Process Information Flow, INFORMS Journal on Computing, vol.24, issue.3, pp.416-432, 2012.
DOI : 10.1287/ijoc.1110.0461

D. Basin, S. J. Burri, and G. Karjoth, Optimal workflow-aware authorizations, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.93-102
DOI : 10.1145/2295136.2295154

J. Crampton, A reference monitor for workflow systems with constrained task execution, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.38-47, 2005.
DOI : 10.1145/1063979.1063986

M. Davis, G. Logemann, and D. Loveland, A machine program for theorem-proving, Communications of the ACM, vol.5, issue.7, pp.394-397, 1962.
DOI : 10.1145/368273.368557

N. Li, M. V. Tripunitara, and Z. Bizri, On mutually exclusive roles and separation-of-duty, ACM Trans. Inf. Syst. Secur, vol.10, issue.2, 2007.

N. Li, M. V. Tripunitara, and Q. Wang, Resiliency policies in access control, Proceedings of the 13th ACM conference on Computer and communications security, CCS '06, pp.113-123, 2006.

H. Lu, J. Vaidya, and V. Atluri, Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008.
DOI : 10.1109/ICDE.2008.4497438

H. Lu, J. Vaidya, V. Atluri, and Y. Hong, Constraint-aware role mining via extended boolean matrix decomposition. Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.5, pp.655-669

M. W. Moskewicz, C. F. Madigan, Y. Zhao, L. Zhang, and S. Malik, Chaff, Proceedings of the 38th conference on Design automation , DAC '01, pp.530-535, 2001.
DOI : 10.1145/378239.379017

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

J. A. Silva and K. A. Sakallah, Grasp: a new search algorithm for satisfiability, Proceedings of the 1996 IEEE/ACM international conference on Computer-aided design, ICCAD '96, pp.220-227, 1996.

L. Stockmeyer, Planar 3-colorability is polynomial complete, ACM SIGACT News, vol.5, issue.3, pp.19-25, 1973.
DOI : 10.1145/1008293.1008294

J. Vaidya, V. Atluri, Q. Guo, and H. Lu, Edge-RMP: Minimizing administrative assignments for role-based access control, Journal of Computer Security, vol.17, issue.2, pp.211-235, 2009.
DOI : 10.3233/JCS-2009-0341

Q. Wang and N. Li, Satisfiability and Resiliency in Workflow Authorization Systems, ACM Transactions on Information and System Security, vol.13, issue.4, pp.1-4035, 2010.
DOI : 10.1145/1880022.1880034