R. 1. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde, Taming role mining complexity in rbac. computers & security, pp.548-564, 2010.
DOI : 10.1016/j.cose.2010.01.001

A. Colantonio, R. D. Pietro, and N. V. Verde, A business-driven decomposition methodology for role mining, Computers & Security, vol.31, issue.7, pp.31844-855, 2012.
DOI : 10.1016/j.cose.2012.01.005

A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber et al., Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.1-10, 2008.
DOI : 10.1145/1377836.1377838

URL : http://www.hpl.hp.com/techreports/2008/HPL-2008-33.pdf

M. Frank, J. M. Buhman, and D. Basin, Role Mining with Probabilistic Models, ACM Transactions on Information and System Security, vol.15, issue.4, p.15, 2013.
DOI : 10.1145/2445566.2445567

URL : http://arxiv.org/pdf/1212.4775

Q. Guo, J. Vaidya, and V. Atluri, The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.237-246, 2008.
DOI : 10.1109/ACSAC.2008.38

H. Huang, F. Shang, J. Liu, and H. Du, Handling least privilege problem and role mining in RBAC, Journal of Combinatorial Optimization, vol.45, issue.2, pp.1-24, 2013.
DOI : 10.1109/ACSAC.2008.21

H. Huang, F. Shang, and J. Zhang, Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, pp.427-432, 2012.
DOI : 10.1109/COMPSACW.2012.81

M. Kuhlmann, D. Shohat, and G. Schimpf, Role mining - revealing business roles for security administration using data mining technology, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775435

H. Lu, Y. Hong, Y. Yang, L. Duan, and N. Badar, Towards user-oriented rbac model, DBSec, pp.81-96, 2013.
DOI : 10.1007/978-3-642-39256-6_6

URL : https://hal.archives-ouvertes.fr/hal-01490719

H. Lu, J. Vaidya, and V. Atluri, Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008.
DOI : 10.1109/ICDE.2008.4497438

URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidya-icde08.pdf

B. Mitra, S. Sural, V. Atluri, and J. Vaidya, Toward Mining of Temporal Roles, Data and Applications Security and Privacy XXVII, pp.65-80, 2013.
DOI : 10.1007/978-3-642-39256-6_5

URL : https://hal.archives-ouvertes.fr/hal-01490718

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining roles with semantic meanings, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.21-30, 2008.
DOI : 10.1145/1377836.1377840

URL : http://www.cs.purdue.edu/homes/chen131/data/role_mining_sacmat08.pdf

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, p.36, 2010.
DOI : 10.1145/1880022.1880030

I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang et al., Evaluating role mining algorithms, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, 2009.
DOI : 10.1145/1542207.1542224

URL : https://www.cs.purdue.edu/homes/ninghui/papers/eval_role_mining_sacmat09.pdf

A. Schaad, J. Moffett, and J. Jacob, The role-based access control system of a European bank, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.3-9, 2001.
DOI : 10.1145/373256.373257

J. Schlegelmilch and U. Steffens, Role mining with ORCA, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005.
DOI : 10.1145/1063979.1064008

G. Tassey, M. P. Gallaher, A. C. Oconnor, and B. Kropp, The economic impact of role-based access control, Economic Analysis, 2002.

E. Uzun, V. Atluri, H. Lu, and J. Vaidya, An Optimization Model for the Extended Role Mining Problem, DBSec, pp.76-89, 2011.
DOI : 10.1007/978-3-642-22348-8_8

URL : https://hal.archives-ouvertes.fr/hal-01586595

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007.
DOI : 10.1145/1266840.1266870

URL : https://hal.archives-ouvertes.fr/hal-01586595

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, ACM Transactions on Information and System Security, vol.13, issue.3, p.27, 2010.
DOI : 10.1145/1805974.1805983

URL : https://hal.archives-ouvertes.fr/hal-01586595

J. Vaidya, V. Atluri, and J. Warner, RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006.
DOI : 10.1145/1180405.1180424

J. Vaidya, V. Atluri, J. Warner, and Q. Guo, Role Engineering via Prioritized Subset Enumeration, IEEE Transactions on Dependable and Secure Computing, vol.7, issue.3, pp.300-314, 2010.
DOI : 10.1109/TDSC.2008.61

N. V. Verde, J. Vaidya, V. Atluri, and A. Colantonio, Role engineering, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.181-192, 2012.
DOI : 10.1145/2133601.2133624

Z. Xu and S. D. Stoller, Algorithms for mining meaningful roles, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.57-66, 2012.
DOI : 10.1145/2295136.2295146

D. Zhang, K. Ramamohanarao, S. Versteeg, and R. Zhang, Graph based strategies to role engineering, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '10, p.25, 2010.
DOI : 10.1145/1852666.1852694

D. Zhang, K. Ramamohanrao, and T. Ebringer, Role engineering using graph optimisation. SACMAT, pp.139-144, 2007.
DOI : 10.1145/1266840.1266862