E. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.191-233, 2001.
DOI : 10.1145/344287.344298

A. Ene, W. G. Horne, N. Milosavljevic, P. Rao, R. Schreiber et al., Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.1-10, 2008.
DOI : 10.1145/1377836.1377838

URL : http://www.hpl.hp.com/techreports/2008/HPL-2008-33.pdf

Q. Guo, J. Vaidya, and V. Atluri, The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.237-246, 2008.
DOI : 10.1109/ACSAC.2008.38

S. Hachana, N. Cuppens-boulahia, and F. Cuppens, Role Mining to Assist Authorization Governance, International Journal of Secure Software Engineering, vol.3, issue.4, pp.45-64, 2012.
DOI : 10.4018/jsse.2012100103

URL : https://hal.archives-ouvertes.fr/hal-01208469

J. B. Joshi, E. Bertino, and A. Ghafoor, Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.74-83, 2002.
DOI : 10.1145/507711.507724

B. Mitra, S. Sural, V. Atluri, and J. Vaidya, Toward Mining of Temporal Roles, Proc. 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), pp.65-80, 2013.
DOI : 10.1007/978-3-642-39256-6_5

URL : https://hal.archives-ouvertes.fr/hal-01490718

B. Mitra, S. Sural, V. Atluri, and J. Vaidya, The generalized temporal role mining problem, Journal of Computer Security, vol.13, issue.3, pp.31-58, 2015.
DOI : 10.1145/1805974.1805983

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, pp.1-3635, 2010.
DOI : 10.1145/1880022.1880030

E. Uzun, D. Lorenzi, V. Atluri, J. Vaidya, and S. Sural, Migrating from DAC to RBAC, Proc. 29th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), volume 9149 of Lecture Notes in Computer Science, 2015.
DOI : 10.1007/978-3-319-20810-7_5

J. Vaidya, V. Atluri, and J. Warner, RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006.
DOI : 10.1145/1180405.1180424

Z. Xu and S. D. Stoller, Algorithms for mining meaningful roles, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.57-66, 2012.
DOI : 10.1145/2295136.2295146