V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, Attribute-based access control, IEEE Computer, vol.48, issue.2, pp.85-88, 2015.

G. Silowash, D. Cappelli, A. Moore, R. Trzeciak, T. Shimeall et al., Common sense guide to mitigating insider threats, 2012.

J. Hwang, T. Xie, V. Hu, and M. Altunay, Mining likely properties of access control policies via association rule mining, Data and Applications Security and Privacy, pp.193-208, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01056688

L. Bauer, S. Garriss, and M. K. Reiter, Detecting and resolving policy misconfigurations in access-control systems, ACM Trans. Inf. Syst. Secur, vol.14, issue.1, p.28, 2011.

J. S. Park and J. Giordano, Role-based profile analysis for scalable and accurate insider-anomaly detection, Proceedings of International Conference on Performance, Computing, and Communications, p.7, 2006.

M. Maloof and G. Stephens, Elicit: A system for detecting insiders who violate need-to-know, Recent Advances in Intrusion Detection, pp.146-166, 2007.

P. A. Legg, O. Buckley, M. Goldsmith, and S. Creese, Caught in the act of an insider attack: Detection and assessment of insider threat, Proceedings of International Symposium on Technologies for Homeland Security, pp.1-6, 2015.

M. Alizadeh, S. Peters, S. Etalle, and N. Zannone, Behavior Analysis in the Medical Sector: Theory and Practice, Proceedings of Symposium on Applied Computing, 2018.

N. Hu, P. G. Bradford, and J. Liu, Applying role based access control and genetic algorithms to insider threat detection, Proceedings of the Annual Southeast Regional Conference, pp.790-791, 2006.
DOI : 10.1145/1185448.1185638

E. Costante, D. Fauri, S. Etalle, J. Den-hartog, and N. Zannone, A hybrid framework for data loss prevention and detection, Proceedings of IEEE Security and Privacy Workshops, pp.324-333, 2016.
DOI : 10.1109/spw.2016.24

V. Frias-martinez, J. Sherrick, S. J. Stolfo, and A. D. Keromytis, A network access control mechanism based on behavior profiles, Proceedings of Annual Computer Security Applications Conference, pp.3-12, 2009.
DOI : 10.1109/acsac.2009.10

URL : https://academiccommons.columbia.edu/doi/10.7916/D8NP2DH8/download

M. Hummer, M. Kunz, M. Netter, L. Fuchs, and G. Pernul, Adaptive identity and access management contextual data based policies, EURASIP Journal on Information Security, vol.2016, issue.1, p.19, 2016.
DOI : 10.1186/s13635-016-0043-2

URL : https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-016-0043-2

A. Margheri, M. Masi, R. Pugliese, and F. Tiezzi, A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies, IEEE Transactions on Software Engineering, 2017.

L. Breiman, Random forests, Machine learning, vol.45, issue.1, pp.5-32, 2001.

D. M. Tax, One-class classification: Concept-learning in the absence of counter-examples, 2001.

J. R. Quinlan, Generating production rules from decision trees, Proceedings of International Joint Conference on Artificial Intelligence, pp.304-307, 1987.

A. Andrzejak, F. Langner, and S. Zabala, Interpretable models from distributed data via merging of decision trees, Proceedings of Symposium on Computational Intelligence and Data Mining, pp.1-9, 2013.

E. J. Spinosa, F. De-leon, A. Ponce, and J. Gama, Novelty detection with application to data streams, Intelligent Data Analysis, vol.13, issue.3, pp.405-422, 2009.
DOI : 10.3233/ida-2009-0373

S. Nellikar, D. M. Nicol, and J. J. Choi, Role-based differentiation for insider detection algorithms, Proceedings of Workshop on Insider Threats, pp.55-62, 2010.
DOI : 10.1145/1866886.1866897

L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein, and J. Tygar, Adversarial machine learning, Proceedings of Workshop on Security and Artificial Intelligence, pp.43-58, 2011.