1. Pavel Berkhin. Survey of clustering data mining techniques. Technical report, Accrue Software, San Jose, CA, 2002.
2. E.J.Coyne. Role-engineering. In 1st ACM Workshop on Role-Based Access Control, 1995.
3. P. Epstein and R. Sandhu. Engineering of role/permission assignment. In 17th Annual Computer Security Application Conference, December 2001.
4. D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. TISSEC, 2001.
5. M. P. Gallagher, A.C. O'Connor, and B. Kropp. The economic impact of role-based access control. Planning report 02-1, National Institute of Standards an Technology, March 2002.