Mohammad Jafari (2009) “Role Mining in Access History Logs”, International Journal of Computer Information Systems and Industrial Management Applications, 1, p. 8. Available at: https://cspub-ijcisim.org/index.php/ijcisim/article/view/17 (Accessed: 16 November 2024).