The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007. ,
DOI : 10.1145/1266840.1266870
Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008. ,
DOI : 10.1109/ICDE.2008.4497438
URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidya-icde08.pdf
Towards role mining with restricted user-role assignment, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp.1-5, 2011. ,
DOI : 10.1109/WIRELESSVITAE.2011.5940855
Role mining with ORCA, Proceedings of the tenth ACM symposium on Access control models and technologies, pp.168-176, 2005. ,
Role Miner: Mining Roles using Subset Enumeration, Proceedings of the 13th ACM conference on Computer and communications security, pp.144-153, 2006. ,
DOI : 10.1109/tdsc.2008.61
Tiling Databases, In: Discovery Science, pp.278-289, 2004. ,
DOI : 10.1007/978-3-540-30214-8_22
Permission Set Mining: Discovering Practical and Useful Roles, 2008 Annual Computer Security Applications Conference (ACSAC), pp.247-256, 2008. ,
DOI : 10.1109/ACSAC.2008.21
Role Engineering using Graph Optimization, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.139-144, 2007. ,
DOI : 10.1145/1266840.1266862
Fast Exact and Heuristic Methods for Role Minimization Problems, Proceedings of the 13th ACM Symposium on Access control Models and Technologies, pp.1-10, 2008. ,
Mining RBAC Roles under Cardinality Constraint, Proceedings of the International Conference on Information Systems Security. Lecture Notes in Computer Science, pp.171-185, 2010. ,
DOI : 10.1007/978-3-642-17714-9_13
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
Proposed NIST Standard for Role-Based Access Control, In: ACM Transactions on Information and System Security, vol.4, issue.3, 2001. ,
Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, p.36, 2010. ,
DOI : 10.1145/1880022.1880030