[1]
Mohammad Jafari et al. 2009. Role Mining in Access History Logs. International Journal of Computer Information Systems and Industrial Management Applications. 1, (Apr. 2009), 8.