[1]
Mohammad Jafari, Amir H. Chinaei, Ken Barker, and Mohammad Fathian, “Role Mining in Access History Logs”, ijcisim, vol. 1, p. 8, Apr. 2009.