Mohammad Jafari, Amir H. Chinaei, Ken Barker, and Mohammad Fathian. “Role Mining in Access History Logs”. International Journal of Computer Information Systems and Industrial Management Applications 1 (April 1, 2009): 8. Accessed September 28, 2024. https://cspub-ijcisim.org/index.php/ijcisim/article/view/17.