J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007.
DOI : 10.1145/1266840.1266870

H. Lu, J. Vaidya, and V. Atluri, Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008.
DOI : 10.1109/ICDE.2008.4497438

URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidya-icde08.pdf

M. Hingankar and S. Sural, Towards role mining with restricted user-role assignment, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp.1-5, 2011.
DOI : 10.1109/WIRELESSVITAE.2011.5940855

S. Jürgen and S. Ulrike, Role mining with ORCA, Proceedings of the tenth ACM symposium on Access control models and technologies, pp.168-176, 2005.

J. Vaidya, V. Atluri, and J. Warner, Role Miner: Mining Roles using Subset Enumeration, Proceedings of the 13th ACM conference on Computer and communications security, pp.144-153, 2006.
DOI : 10.1109/tdsc.2008.61

F. Geerts, B. Goethals, and T. Mielikinen, Tiling Databases, In: Discovery Science, pp.278-289, 2004.
DOI : 10.1007/978-3-540-30214-8_22

D. Zhang, R. Kotagiri, E. Tim, and Y. Trevor, Permission Set Mining: Discovering Practical and Useful Roles, 2008 Annual Computer Security Applications Conference (ACSAC), pp.247-256, 2008.
DOI : 10.1109/ACSAC.2008.21

D. Zhang, R. Kotagiri, and E. Tim, Role Engineering using Graph Optimization, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.139-144, 2007.
DOI : 10.1145/1266840.1266862

E. Alina, H. William, M. Nikola, R. Prasad, S. Robert et al., Fast Exact and Heuristic Methods for Role Minimization Problems, Proceedings of the 13th ACM Symposium on Access control Models and Technologies, pp.1-10, 2008.

R. Kumar, S. Sural, and A. Gupta, Mining RBAC Roles under Cardinality Constraint, Proceedings of the International Conference on Information Systems Security. Lecture Notes in Computer Science, pp.171-185, 2010.
DOI : 10.1007/978-3-642-17714-9_13

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. David, R. Ferraiolo, S. Sandhu, D. R. Gavrila, R. Kuhn et al., Proposed NIST Standard for Role-Based Access Control, In: ACM Transactions on Information and System Security, vol.4, issue.3, 2001.

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, p.36, 2010.
DOI : 10.1145/1880022.1880030