N. Gal-oz, Y. Gonen, R. Yahalom, E. Gudes, B. Rozenberg et al., Mining Roles from Web Application Usage Patterns, Proc. 8th Int'l. Conference on Trust, Privacy and Security in Digital Business (TrustBus, pp.125-137, 2011.
DOI : 10.1007/978-3-642-13739-6_7

S. Hachana, N. Cuppens-boulahia, and F. Cuppens, Role Mining to Assist Authorization Governance, International Journal of Secure Software Engineering, vol.3, issue.4, pp.45-64, 2012.
DOI : 10.4018/jsse.2012100103

URL : https://hal.archives-ouvertes.fr/hal-01208469

V. C. Hu, D. Ferraiolo, R. Kuhn, A. R. Friedman, A. J. Lang et al., Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Final Draft) NIST Special Publication, pp.800-162, 2013.

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, 2010.
DOI : 10.1145/1880022.1880030

I. Molloy, Y. Park, and S. Chari, Generative models for access control policies, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, 2012.
DOI : 10.1145/2295136.2295145

S. H. Muggleton, Inverse entailment and progol, New Generation Computing, vol.12, issue.1, pp.245-286, 1995.
DOI : 10.1007/BF03037227

S. H. Muggleton and J. Firth, CProgol4.4: a tutorial introduction, Relational Data Mining, pp.160-188, 2001.

Q. Ni, J. Lobo, S. Calo, P. Rohatgi, and E. Bertino, Automating role-based provisioning by learning from examples, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.75-84, 2009.
DOI : 10.1145/1542207.1542222

Z. Xu and S. D. Stoller, Mining attribute-based access control policies Computing Research Repository (CoRR) abs/1306, 2013.

W. Zhang, Y. Chen, C. A. Gunter, D. Liebovitz, and B. Malin, Evolving role definitions through permission invocation patterns, Proceedings of the 18th ACM symposium on Access control models and technologies, SACMAT '13, pp.37-48, 2013.
DOI : 10.1145/2462410.2462422

W. Zhang, C. A. Gunter, D. Liebovitz, J. Tian, and B. Malin, Role prediction using electronic medical record system audits, AMIA Annual Symposium Proceedings . pp, pp.858-867, 2011.