Taming role mining complexity in rbac. computers & security, pp.548-564, 2010. ,
DOI : 10.1016/j.cose.2010.01.001
A business-driven decomposition methodology for role mining, Computers & Security, vol.31, issue.7, pp.31844-855, 2012. ,
DOI : 10.1016/j.cose.2012.01.005
Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.1-10, 2008. ,
DOI : 10.1145/1377836.1377838
URL : http://www.hpl.hp.com/techreports/2008/HPL-2008-33.pdf
Role Mining with Probabilistic Models, ACM Transactions on Information and System Security, vol.15, issue.4, p.15, 2013. ,
DOI : 10.1145/2445566.2445567
URL : http://arxiv.org/pdf/1212.4775
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.237-246, 2008. ,
DOI : 10.1109/ACSAC.2008.38
Handling least privilege problem and role mining in RBAC, Journal of Combinatorial Optimization, vol.45, issue.2, pp.1-24, 2013. ,
DOI : 10.1109/ACSAC.2008.21
Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, pp.427-432, 2012. ,
DOI : 10.1109/COMPSACW.2012.81
Role mining - revealing business roles for security administration using data mining technology, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775435
Towards user-oriented rbac model, DBSec, pp.81-96, 2013. ,
DOI : 10.1007/978-3-642-39256-6_6
URL : https://hal.archives-ouvertes.fr/hal-01490719
Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008. ,
DOI : 10.1109/ICDE.2008.4497438
URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidya-icde08.pdf
Toward Mining of Temporal Roles, Data and Applications Security and Privacy XXVII, pp.65-80, 2013. ,
DOI : 10.1007/978-3-642-39256-6_5
URL : https://hal.archives-ouvertes.fr/hal-01490718
Mining roles with semantic meanings, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.21-30, 2008. ,
DOI : 10.1145/1377836.1377840
URL : http://www.cs.purdue.edu/homes/chen131/data/role_mining_sacmat08.pdf
Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, p.36, 2010. ,
DOI : 10.1145/1880022.1880030
Evaluating role mining algorithms, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, 2009. ,
DOI : 10.1145/1542207.1542224
URL : https://www.cs.purdue.edu/homes/ninghui/papers/eval_role_mining_sacmat09.pdf
The role-based access control system of a European bank, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.3-9, 2001. ,
DOI : 10.1145/373256.373257
Role mining with ORCA, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005. ,
DOI : 10.1145/1063979.1064008
The economic impact of role-based access control, Economic Analysis, 2002. ,
An Optimization Model for the Extended Role Mining Problem, DBSec, pp.76-89, 2011. ,
DOI : 10.1007/978-3-642-22348-8_8
URL : https://hal.archives-ouvertes.fr/hal-01586595
The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007. ,
DOI : 10.1145/1266840.1266870
URL : https://hal.archives-ouvertes.fr/hal-01586595
The role mining problem, ACM Transactions on Information and System Security, vol.13, issue.3, p.27, 2010. ,
DOI : 10.1145/1805974.1805983
URL : https://hal.archives-ouvertes.fr/hal-01586595
RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006. ,
DOI : 10.1145/1180405.1180424
Role Engineering via Prioritized Subset Enumeration, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.3, pp.300-314, 2010. ,
DOI : 10.1109/TDSC.2008.61
Role engineering, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.181-192, 2012. ,
DOI : 10.1145/2133601.2133624
Algorithms for mining meaningful roles, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.57-66, 2012. ,
DOI : 10.1145/2295136.2295146
Graph based strategies to role engineering, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '10, p.25, 2010. ,
DOI : 10.1145/1852666.1852694
Role engineering using graph optimisation. SACMAT, pp.139-144, 2007. ,
DOI : 10.1145/1266840.1266862