M. Abedin, S. Nessa, L. Khan, E. Al-shaer, and M. Awad, Analysis of firewall policy rules using trac mining techniques, Int. J. Internet Protocol Technology, vol.5, issue.12, pp.2010-2023

E. S. Shaer and H. H. Hamed, Discovery of policy anomalies in distributed firewalls, 23th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, pp.2605-2616, 2004.

E. S. Shaer and H. H. Hamed, Modeling and management of firewall policies. Network and Service Management, IEEE Transactions on, vol.1, issue.1 11, pp.2-10, 2004.

J. G. Alfaro, N. Boulahia-cuppens, and F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.1615-5262, 2008.
DOI : 10.1007/s10207-007-0045-7

URL : https://hal.archives-ouvertes.fr/hal-01207771

J. Amilhastre, P. Janssen, and M. Vilarem, Complexity of minimum biclique cover and minimum biclique decomposition for bipartite domino-free graphs, Discrete Applied Mathematics, vol.86, issue.2-3, pp.125-144, 1998.
DOI : 10.1016/S0166-218X(98)00039-0

G. Arévalo, A. Berry, M. Huchard, G. Perrot, and A. Sigayret, Performances of Galois Sub-hierarchy-building Algorithms, Proceedings of the 5th international conference on Formal concept analysis ICFCA'07, pp.166-180, 2007.
DOI : 10.1007/978-3-540-70901-5_11

P. Chen, G. Ding, and S. Seiden, On poset merging, p.57, 2003.

A. Colantonio, Role Mining Techniques To Improve RBAC Administration, Facoltà di Scienze Matematiche Fisiche e Naturali, XXIII Ciclo del Dottorato di Ricerca in Matematica, p.39, 2011.

A. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde, A formal framework to elicit roles with business meaning in RBAC systems, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.85-94, 1928.
DOI : 10.1145/1542207.1542223

A. Colantonio, R. D. Pietro, and A. Ocello, Leveraging Lattices to Improve Role Mining, Proceedings of the 23rd International Information Security Conference IFIP SEC'08, pp.333-347, 2008.
DOI : 10.1007/978-0-387-09699-5_22

A. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde, Mining Stable Roles in RBAC, Proceedings of the 24th International Information Security Conference IFIP SEC'09, pp.259-269, 2009.
DOI : 10.1006/jagm.2000.1097

A. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde, A new role mining framework to elicit business roles and to mitigate enterprise risk, Decision Support Systems, vol.50, issue.4, pp.715-731, 2011.
DOI : 10.1016/j.dss.2010.08.022

A. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde, Visual Role Mining: A Picture Is Worth a Thousand Roles, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.6, p.39, 2011.
DOI : 10.1109/TKDE.2011.37

F. Cuppens, N. Cuppens-boulahia, and J. Garcia, Misconfiguration management of network security components, IASTED International Conference on Communication, Network,and Information Security, p.11, 2005.

F. Cuppens, N. Cuppens-boulahia, T. Sans, and A. Miège, A Formal Approach to Specify and Deploy a Network Security Policy, Formal Aspects in Security and Trust, pp.203-218, 2004.
DOI : 10.1007/0-387-24098-5_15

N. Cuppens-boulahia and F. Cuppens, Gestion des identités et des autorisations, MISC: Multisystem & Internet, p.40, 2012.

A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber et al., Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.1-10, 2008.
DOI : 10.1145/1377836.1377838

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.5932

D. Farmer and W. Venema, Improving the security of your site by breaking into it

M. Frank, J. M. Buhmann, and D. Basin, On the definition of role mining, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.35-44, 1924.
DOI : 10.1145/1809842.1809851

M. Frank, A. P. Streich, D. A. Basin, and J. M. Buhmann, A probabilistic approach to hybrid role mining, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.101-111, 1928.
DOI : 10.1145/1653662.1653675

M. Freiss, Protecting Networks with SATAN. O Reilly Media, 1998.

L. Fuchs and S. Meier, The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective, 2011 Sixth International Conference on Availability, Reliability and Security, pp.35-42, 2011.
DOI : 10.1109/ARES.2011.12

L. Fuchs, G. Pernul, and R. S. Sandhu, Roles in information security ??? A survey and classification of the research area, Computers & Security, vol.30, issue.8, pp.748-769, 1920.
DOI : 10.1016/j.cose.2011.08.002

P. Michael, A. C. Gallaher, B. Connor, and . Kropp, The economic impact of role-based access control, RIT for NIST (National Institute of Standards and Technology), 2002.

B. Ganter and R. Wille, Formal Concept Analysis -Mathematical Foundations, p.101, 1999.

R. L. Goodstein, Boolean Algebra, p.91, 2007.

S. Hachana, N. Cuppens-boulahia, and F. Cuppens, Role Mining to Assist Authorization Governance, International Journal of Secure Software Engineering, vol.3, issue.4, pp.2012-2016
DOI : 10.4018/jsse.2012100103

URL : https://hal.archives-ouvertes.fr/hal-01208469

D. Haixin, W. Jianping, and L. Xing, Policy based access control framework for large networks, Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium, pp.267-272, 2000.
DOI : 10.1109/ICON.2000.875800

A. Abou, E. Kalam, S. Benferhat, A. Miege, R. E. Baida et al., Organization based access control, 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003, pp.0-7695, 2003.
URL : https://hal.archives-ouvertes.fr/hal-01483818

C. Kemp, J. B. Tenenbaum, T. L. Griths, T. Yamada, and N. Ueda, Learning systems of concepts with an infinite relational model, Proceedings of the 21st national conference on Artificial intelligence, pp.381-388, 2006.

D. Kennedy, J. O. Gorman, D. Kearns, and M. Aharoni, Metasploit : The Penetration Tester's Guide, 2011.

C. Virginia, A. J. Klema, and . Laub, The singular value decomposition: Its computation and some applications, IEEE Transactions on Automatic Control, vol.25, issue.33, pp.164-176, 1980.

M. Koyuturk, A. Grama, and N. Ramakrishnan, Nonorthogonal decomposition of binary matrices for bounded-error data compression and analysis, ACM Transactions on Mathematical Software, vol.32, issue.1, pp.33-69, 2006.
DOI : 10.1145/1132973.1132976

P. Krajca, J. Outrata, and V. Vychodil, Parallel recursive algorithm for FCA, Proceedings of the Sixth International Conference on Concept Lattices and Their Applications, pp.71-82, 2008.

M. Kuhlmann, D. Shohat, and G. Schimpf, Role mining - revealing business roles for security administration using data mining technology, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.179-186, 2003.
DOI : 10.1145/775412.775435

D. D. Lee and H. S. Seung, Algorithms for non-negative matrix factorization, Neural Information Processing Systems (NIPS), pp.556-562, 2000.

H. Lu, J. Vaidya, and V. Atluri, Optimal Boolean Matrix Decomposition: Application to Role Engineering, 2008 IEEE 24th International Conference on Data Engineering, pp.297-306, 2008.
DOI : 10.1109/ICDE.2008.4497438

URL : http://cimic.rutgers.edu/~jsvaidya/pub-papers/vaidya-icde08.pdf

X. Ma, R. Li, and Z. Lu, Role mining based on weights, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, 1928.
DOI : 10.1145/1809842.1809854

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.7445

R. Macfarlane, W. J. Buchanan, E. Ekonomou, O. Uthmani, L. Fan et al., Review of security policy implementations, Computers & Security (COMPSEC), vol.2, issue.31 1, pp.253-270, 2011.

J. M. Buhmann-mario, D. Frank, and . Basin, A class of probabilistic models for role engineering, Proceedings of the 15th ACM Computer and Communications Security Conference CCS'08, pp.27-31, 2008.

R. Marmorstein and P. Kearns, A tool for automated iptables firewall analysis, USENIX annual technical conference, 2005.

M. Robert, P. Marmorstein, and . Kearns, Firewall analysis with policy-based host classification, Proceedings of the 20th conference on Large Installation System Administration LISA'06, pp.41-51, 2006.

A. Mayer, A. Wool, and E. Ziskind, Fang: a firewall analysis engine, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000.
DOI : 10.1109/SECPRI.2000.848455

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining roles with semantic meanings, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.21-30, 1928.
DOI : 10.1145/1377836.1377840

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining Roles with Multiple Objectives, ACM Transactions on Information and System Security, vol.13, issue.4, pp.36-37, 2010.
DOI : 10.1145/1880022.1880030

I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang et al., Evaluating role mining algorithms, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.95-104, 2009.
DOI : 10.1145/1542207.1542224

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.567.4536

I. Molloy, N. Lialan, J. Qi, L. Lobo, and . Dickens, Mining roles with noisy data, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.45-54, 1929.
DOI : 10.1145/1809842.1809852

R. Nikolaus, Learning the parts of objects using non-negative matrix factorization (nmf), 1933.

S. Preda, N. Cuppens-boulahia, F. Cuppens, J. García-alfaro, and L. Toutain, Model-Driven Security Policy Deployment: Property Oriented Approach, International Symposium on Engineering Secure Software and Systems ESSoS 2010, pp.123-139, 2010.
DOI : 10.1007/978-3-642-11747-3_10

URL : https://hal.archives-ouvertes.fr/hal-00540842

S. Preda, N. Cuppens-boulahia, F. Cuppens, and L. Toutain, Architecture-Aware Adaptive Deployment of Contextual Security Policies, 2010 International Conference on Availability, Reliability and Security, p.16, 2010.
DOI : 10.1109/ARES.2010.45

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, pp.1557-1577, 2005.
DOI : 10.1109/TKDE.2005.185

P. Ajit, G. J. Singh, and . Gordon, Relational learning via collective matrix factorization, p.33, 2008.

A. P. Streich, M. Frank, and J. M. Buhmann, Multi-assignment clustering for Boolean data, Proceedings of the 26th Annual International Conference on Machine Learning, ICML '09, pp.969-976, 2009.
DOI : 10.1145/1553374.1553498

H. Takabi and J. B. Joshi, StateMiner, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.55-64
DOI : 10.1145/1809842.1809853

R. Thion, D??couverte automatis??e de hi??rarchies de r??les pour les politiques de contr??le d'acc??s, INFORSID, pp.139-154, 2007.
DOI : 10.3166/isi.13.4.107-131

A. Titov and V. Zaborovsky, Firewall configuration based on specifications of access policy and network environment, p.16, 2010.

A. Tongaonkar, N. Inamdar, and R. Sekar, Inferring higher level policies from firewall rules, Proceedings of the 21st Large Installation System Administration Conference LISA '07, p.50, 2007.

S. Alok and . Tongaonkar, Fast pattern-matching techniques for packet filtering. The graduate school in partial fulfillment of the requirements for the degree of master of science in computer science, 1945.

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184
DOI : 10.1145/1266840.1266870

J. Vaidya, V. Atluri, Q. Guo, and N. R. Adam, Migrating to optimal RBAC with minimal perturbation, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.11-20, 2008.
DOI : 10.1145/1377836.1377839

J. Vaidya, V. Atluri, and J. Warner, RoleMiner, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.144-153, 2006.
DOI : 10.1145/1180405.1180424

A. Wool, Architecting the lumeta firewall analyzer, Proceedings of the 10th Conference on USENIX Security Symposium of SSYM'01, pp.7-19, 2001.

L. Yuan and H. Chen, Fireman: A toolkit for firewall modeling and analysis, Proceedings of IEEE Symposium on Security and Privacy, pp.199-213, 2006.

M. Abedin, S. Nessa, L. Khan, E. Al-shaer, and M. Awad, Analysis of firewall policy rules using trac mining techniques, Int. J. Internet Protocol Technology, vol.5, issue.12 6, p.2010

J. G. Alfaro, N. Boulahia-cuppens, and F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.1615-5262, 2008.
DOI : 10.1007/s10207-007-0045-7

URL : https://hal.archives-ouvertes.fr/hal-01207771

A. Colantonio, R. D. Pietro, and A. Ocello, Leveraging Lattices to Improve Role Mining, Proceedings of the 23rd International Information Security Conference IFIP SEC'08, pp.333-347, 2008.
DOI : 10.1007/978-0-387-09699-5_22

A. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde, Visual Role Mining: A Picture Is Worth a Thousand Roles, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.6, p.12, 2011.
DOI : 10.1109/TKDE.2011.37

F. Cuppens, N. Cuppens-boulahia, and J. Garcia, Misconfiguration management of network security components, IASTED International Conference on Communication, Network,and Information Security, 2005.

F. Cuppens, N. Cuppens-boulahia, T. Sans, and A. Miège, A Formal Approach to Specify and Deploy a Network Security Policy, Formal Aspects in Security and Trust, pp.203-218, 2004.
DOI : 10.1007/0-387-24098-5_15

A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber et al., Fast exact and heuristic methods for role minimization problems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.1-10, 2008.
DOI : 10.1145/1377836.1377838

D. Farmer and W. Venema, Improving the security of your site by breaking into it

M. Frank, J. M. Buhmann, and D. Basin, On the definition of role mining, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.35-44, 2009.
DOI : 10.1145/1809842.1809851

M. Frank, A. P. Streich, D. A. Basin, and J. M. Buhmann, A probabilistic approach to hybrid role mining, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.101-111, 2009.
DOI : 10.1145/1653662.1653675

M. Freiss, Protecting Networks with SATAN. O Reilly Media, 1998.

B. Ganter and R. Wille, Formal Concept Analysis -Mathematical Foundations, p.35, 1999.

A. Abou, E. Kalam, S. Benferhat, A. Miege, R. E. Baida et al., Organization based access control, 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003, pp.0-7695, 2003.
URL : https://hal.archives-ouvertes.fr/hal-01483818

C. Virginia, A. J. Klema, and . Laub, The singular value decomposition : Its computation and some applications, IEEE Transactions on Automatic Control, vol.25, issue.11, pp.164-176, 1980.

M. Koyuturk, A. Grama, and N. Ramakrishnan, Nonorthogonal decomposition of binary matrices for bounded-error data compression and analysis, ACM Transactions on Mathematical Software, vol.32, issue.1, pp.33-69, 2006.
DOI : 10.1145/1132973.1132976

D. D. Lee and H. S. Seung, Algorithms for non-negative matrix factorization, Neural Information Processing Systems (NIPS), pp.556-562, 2000.

J. M. Buhmann-mario, D. Frank, and . Basin, A class of probabilistic models for role engineering, Proceedings of the 15th ACM Computer and Communications Security Conference CCS'08, pp.27-31, 2008.

M. Robert, P. Marmorstein, and . Kearns, Firewall analysis with policy-based host classification, Proceedings of the 20th conference on Large Installation System Administration LISA'06, pp.41-51, 2006.

A. Mayer, A. Wool, and E. Ziskind, Fang: a firewall analysis engine, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000.
DOI : 10.1109/SECPRI.2000.848455

I. Molloy, H. Chen, T. Li, Q. Wang, N. Li et al., Mining roles with semantic meanings, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.21-30, 2008.
DOI : 10.1145/1377836.1377840

I. Molloy, N. Lialan, J. Qi, L. Lobo, and . Dickens, Mining roles with noisy data, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.45-54, 2010.
DOI : 10.1145/1809842.1809852

R. Nikolaus, Learning the parts of objects using non-negative matrix factorization (nmf), 2007.

S. Preda, N. Cuppens-boulahia, F. Cuppens, J. García-alfaro, and L. Toutain, Model-Driven Security Policy Deployment: Property Oriented Approach, International Symposium on Engineering Secure Software and Systems ESSoS 2010, pp.123-139, 2010.
DOI : 10.1007/978-3-642-11747-3_10

URL : https://hal.archives-ouvertes.fr/hal-00540842

S. Preda, N. Cuppens-boulahia, F. Cuppens, and L. Toutain, Architecture-Aware Adaptive Deployment of Contextual Security Policies, 2010 International Conference on Availability, Reliability and Security, 2010.
DOI : 10.1109/ARES.2010.45

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

R. Thion, D??couverte automatis??e de hi??rarchies de r??les pour les politiques de contr??le d'acc??s, INFORSID, pp.139-154, 2007.
DOI : 10.3166/isi.13.4.107-131

A. Tongaonkar, N. Inamdar, and R. Sekar, Inferring higher level policies from firewall rules, Proceedings of the 21st Large Installation System Administration Conference LISA '07, p.16, 2007.

S. Alok and . Tongaonkar, Fast pattern-matching techniques for packet filtering. The graduate school in partial fulfillment of the requirements for the degree of master of science in computer science, 2004.

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184
DOI : 10.1145/1266840.1266870

J. Vaidya, V. Atluri, Q. Guo, and N. R. Adam, Migrating to optimal RBAC with minimal perturbation, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.11-20, 2008.
DOI : 10.1145/1377836.1377839

L. Yuan and H. Chen, Fireman : A toolkit for firewall modeling and analysis, Proceedings of IEEE Symposium on Security and Privacy, pp.199-213, 2006.

D. Zhang, K. Ramamohanarao, and T. Ebringer, Role engineering using graph optimisation, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.139-144, 2007.
DOI : 10.1145/1266840.1266862