Mining Roles from Web Application Usage Patterns, Proc. 8th Int'l. Conference on Trust, Privacy and Security in Digital Business (TrustBus, pp.125-137, 2011. ,
DOI : 10.1007/978-3-642-13739-6_7
Role Mining to Assist Authorization Governance, International Journal of Secure Software Engineering, vol.3, issue.4, pp.45-64, 2012. ,
DOI : 10.4018/jsse.2012100103
URL : https://hal.archives-ouvertes.fr/hal-01208469
Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Final Draft) NIST Special Publication, pp.800-162, 2013. ,
Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, 2010. ,
DOI : 10.1145/1880022.1880030
Generative models for access control policies, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, 2012. ,
DOI : 10.1145/2295136.2295145
Inverse entailment and progol, New Generation Computing, vol.12, issue.1, pp.245-286, 1995. ,
DOI : 10.1007/BF03037227
CProgol4.4: a tutorial introduction, Relational Data Mining, pp.160-188, 2001. ,
Automating role-based provisioning by learning from examples, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.75-84, 2009. ,
DOI : 10.1145/1542207.1542222
Mining attribute-based access control policies Computing Research Repository (CoRR) abs/1306, 2013. ,
Evolving role definitions through permission invocation patterns, Proceedings of the 18th ACM symposium on Access control models and technologies, SACMAT '13, pp.37-48, 2013. ,
DOI : 10.1145/2462410.2462422
Role prediction using electronic medical record system audits, AMIA Annual Symposium Proceedings . pp, pp.858-867, 2011. ,