A. Pdfbox, https://pdfbox.apache.org/index.html 2. Federal information security management act of 2002. Title III of the E- Government Act of, 2002.

M. C. De-marneffe, B. Maccartney, and C. D. Manning, Generating typed dependency parses from phrase structure parses, Proceedings of LREC, pp.449-454, 2006.

B. Dolan, C. Brockett, and C. Quirk, Microsoft research paraphrase corpus, 2005.

G. Forman and I. Cohen, Learning from Little: Comparison of Classifiers Given Little Training, European Conference on Principles of Data Mining and Knowledge Discovery, pp.161-172, 2004.
DOI : 10.1007/978-3-540-30116-5_17

N. Gal-oz, Y. Gonen, R. Yahalom, E. Gudes, B. Rozenberg et al., Mining Roles from Web Application Usage Patterns, International Conference on Trust, Privacy and Security in Digital Business, pp.125-137, 2011.
DOI : 10.1145/1805974.1805983

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

N. Hu, P. G. Bradford, and J. Liu, Applying role based access control and genetic algorithms to insider threat detection, Proceedings of the 44th annual southeast regional conference on , ACM-SE 44, pp.790-791, 2006.
DOI : 10.1145/1185448.1185638

V. C. Hu, D. Ferraiolo, R. Kuhn, A. R. Friedman, A. J. Lang et al., Guide to attribute based access control (abac) definition and considerations (draft), NIST special publication, vol.800, issue.162, 2013.
DOI : 10.6028/nist.sp.800-162

T. Joachims, Text categorization with Support Vector Machines: Learning with many relevant features, Machine learning: ECML-98 pp, pp.137-142, 1998.
DOI : 10.1007/BFb0026683

URL : http://ranger.uta.edu/~alp/ix/readings/SVMsforTextCategorization.pdf

D. Kong, L. Cen, and H. Jin, AUTOREB, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.530-541, 2015.
DOI : 10.1007/978-3-642-39235-1_3

X. Lu, Automatic analysis of syntactic complexity in second language writing, International Journal of Corpus Linguistics, vol.15, issue.4, pp.474-496, 2010.
DOI : 10.1075/ijcl.15.4.02lu

C. D. Manning, P. Raghavan, and H. Schütze, Probabilistic information retrieval. Introduction to Information Retrieval pp, pp.220-235, 2009.

E. Medvet, A. Bartoli, B. Carminati, and E. Ferrari, Evolutionary Inference of Attribute-Based Access Control Policies, International Conference on Evolutionary Multi-Criterion Optimization, pp.351-365, 2015.
DOI : 10.1007/978-3-319-15934-8_24

M. Narouei, H. Khanpour, H. Takabi, N. Parde, and R. Nielsen, Towards a Top-down Policy Engineering Framework for Attribute-based Access Control, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies , SACMAT '17 Abstracts, 2017.
DOI : 10.1109/TDSC.2014.2369048

M. Narouei and H. Takabi, Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques, IFIP International Conference on Information Security Theory and Practice, pp.137-152, 2015.
DOI : 10.1145/2393596.2393608

URL : https://hal.archives-ouvertes.fr/hal-01442558

M. Narouei and H. Takabi, Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.157-160, 2015.
DOI : 10.1145/2393596.2393608

A. Y. Ng and M. I. Jordan, On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes Advances in neural information processing systems 2, pp.841-848, 2002.

L. Ortega, Syntactic Complexity Measures and their Relationship to L2 Proficiency: A Research Synthesis of College-level L2 Writing, Applied Linguistics, vol.24, issue.4, pp.492-518, 2003.
DOI : 10.1093/applin/24.4.492

S. P. Ponzetto and M. Strube, Knowledge derived from wikipedia for computing semantic relatedness, J. Artif. Intell. Res.(JAIR), vol.30, pp.181-212, 2007.

V. Rus, M. C. Lintean, R. Banjade, N. B. Niraula, and D. Stefanescu, Semilar: The semantic similarity toolkit, ACL (Conference System Demonstrations, pp.163-168, 2013.

J. Slankas, X. Xiao, L. Williams, and T. Xie, Relation extraction for inferring access control rules from natural language artifacts, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, pp.366-375, 2014.
DOI : 10.1016/S0950-5849(03)00100-9

J. B. Slankas, Implementing database access control policy from unconstrained natural language text, 2013 35th International Conference on Software Engineering (ICSE), 2015.
DOI : 10.1109/ICSE.2013.6606716

P. D. Turney, Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL, European Conference on Machine Learning, pp.491-502, 2001.
DOI : 10.1007/3-540-44795-4_42

R. Van-de-stadt, Cyberchair: A web-based groupware application to facilitate the paper reviewing process. arXiv preprint arXiv, pp.1206-1833, 2012.

K. Wolfe-quintero, S. Inagaki, and H. Y. Kim, Second language development in writing: Measures of fluency, accuracy, & complexity, 1998.

X. Xiao, A. Paradkar, S. Thummalapenta, and T. Xie, Automated extraction of security policies from natural-language software documents, Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12, p.12, 2012.
DOI : 10.1145/2393596.2393608

Z. Xu and S. D. Stoller, Mining Attribute-Based Access Control Policies from Logs, IFIP Annual Conference on Data and Applications Security and Privacy, pp.276-291, 2014.
DOI : 10.1007/978-3-662-43936-4_18

URL : https://hal.archives-ouvertes.fr/hal-01284862

Z. Xu and S. D. Stoller, Mining Attribute-Based Access Control Policies, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.5, pp.533-545, 2015.
DOI : 10.1109/TDSC.2014.2369048

URL : https://hal.archives-ouvertes.fr/hal-01284862