1. Policy Management Using Access Control Spaces;Jaeger;Int. J. ACM Trans.,2003
2. A Survey of Role Mining;Mitra;ACM Comput. Surv.,2016
3. Mario, F., Joachim, M.B., and David, B. (2010, January 9–11). On the Definition of Role Mining. Proceedings of the ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA.
4. Role recommender-RBAC: Optimizing user-role assignments in RBAC;Krra;Comput. Commun.,2021
5. Jurgen, S., and Ulrike, S. (2005, January 1–3). Role mining with ORCA. Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden.