Mohammad Jafari, et al. “Role Mining in Access History Logs”. International Journal of Computer Information Systems and Industrial Management Applications, vol. 1, Apr. 2009, p. 8, https://cspub-ijcisim.org/index.php/ijcisim/article/view/17.