Role mining - revealing business roles for security administration using data mining technology,” in (2003)

by M Kuhlmann, D Shohat, G Schimpf
Venue:Proc. of the 8th ACM symposium on Access control models and technologies (SACMAT’03), Villa Gallia,