TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.191-233, 2001. ,
DOI : 10.1145/344287.344298
Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.1-10, 2008. ,
DOI : 10.1145/1377836.1377838
URL : http://www.hpl.hp.com/techreports/2008/HPL-2008-33.pdf
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.237-246, 2008. ,
DOI : 10.1109/ACSAC.2008.38
Role Mining to Assist Authorization Governance, International Journal of Secure Software Engineering, vol.3, issue.4, pp.45-64, 2012. ,
DOI : 10.4018/jsse.2012100103
URL : https://hal.archives-ouvertes.fr/hal-01208469
Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.74-83, 2002. ,
DOI : 10.1145/507711.507724
Toward Mining of Temporal Roles, Proc. 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), pp.65-80, 2013. ,
DOI : 10.1007/978-3-642-39256-6_5
URL : https://hal.archives-ouvertes.fr/hal-01490718
The generalized temporal role mining problem, Journal of Computer Security, vol.13, issue.3, pp.31-58, 2015. ,
DOI : 10.1145/1805974.1805983
Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, pp.1-3635, 2010. ,
DOI : 10.1145/1880022.1880030
Migrating from DAC to RBAC, Proc. 29th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), volume 9149 of Lecture Notes in Computer Science, 2015. ,
DOI : 10.1007/978-3-319-20810-7_5
RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006. ,
DOI : 10.1145/1180405.1180424
Algorithms for mining meaningful roles, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.57-66, 2012. ,
DOI : 10.1145/2295136.2295146