Every planar map is four colorable, Illinois Journal of Mathematics, vol.21, issue.3, pp.429-567, 1977. ,
A Chinese wall security model for decentralized workflow systems, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.48-57, 2001. ,
DOI : 10.1145/501983.501991
Supporting conditional delegation in secure workflow management systems, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.49-58, 2005. ,
DOI : 10.1145/1063979.1063990
On the Prevention of Fraud and Privacy Exposure in Process Information Flow, INFORMS Journal on Computing, vol.24, issue.3, pp.416-432, 2012. ,
DOI : 10.1287/ijoc.1110.0461
Optimal workflow-aware authorizations, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.93-102 ,
DOI : 10.1145/2295136.2295154
A reference monitor for workflow systems with constrained task execution, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.38-47, 2005. ,
DOI : 10.1145/1063979.1063986
A machine program for theorem-proving, Communications of the ACM, vol.5, issue.7, pp.394-397, 1962. ,
DOI : 10.1145/368273.368557
On mutually exclusive roles and separation-of-duty, ACM Trans. Inf. Syst. Secur, vol.10, issue.2, 2007. ,
Resiliency policies in access control, Proceedings of the 13th ACM conference on Computer and communications security, CCS '06, pp.113-123, 2006. ,
Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008. ,
DOI : 10.1109/ICDE.2008.4497438
Constraint-aware role mining via extended boolean matrix decomposition. Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.5, pp.655-669 ,
Chaff, Proceedings of the 38th conference on Design automation , DAC '01, pp.530-535, 2001. ,
DOI : 10.1145/378239.379017
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Grasp: a new search algorithm for satisfiability, Proceedings of the 1996 IEEE/ACM international conference on Computer-aided design, ICCAD '96, pp.220-227, 1996. ,
Planar 3-colorability is polynomial complete, ACM SIGACT News, vol.5, issue.3, pp.19-25, 1973. ,
DOI : 10.1145/1008293.1008294
Edge-RMP: Minimizing administrative assignments for role-based access control, Journal of Computer Security, vol.17, issue.2, pp.211-235, 2009. ,
DOI : 10.3233/JCS-2009-0341
Satisfiability and Resiliency in Workflow Authorization Systems, ACM Transactions on Information and System Security, vol.13, issue.4, pp.1-4035, 2010. ,
DOI : 10.1145/1880022.1880034