. Ganter, 1997) : ils ne peuvent pas être exprimés comme l'union ou l'intersection d'autres concepts. Nous pensons qu'il serait intéressant d'introduire cette notion dans notre proposition : à partir d'une caractérisation formelle, nous apposerions des labels sur les concepts de la SHG. On pourrait faire intervenir ces labels accompagnés d'autres indicateurs sur les notes que nous avons faits figurés sur les hiérarchies de la figure 2. L'objectif serait de faciliter la sélection des concepts pertinents et l, Parmi les concepts présents dans la SHG, certains sont sup-irréductibles ou infirréductibles

A. Berry, M. Huchard, R. M. Mcconnell, A. Sigayret, and J. Spinrad, Efficiently Computing a Linear Extension of the Sub-hierarchy of a Concept Lattice, 3rd International Conference on Formal Concept Analysis, ICFCA'2005, pp.208-222, 2005.
DOI : 10.1007/978-3-540-32262-7_14

URL : https://hal.archives-ouvertes.fr/lirmm-00106459

E. J. Coyne, ». , and R. , 95 : Proceedings of the first ACM Workshop on Role-based access control, p.4, 1996.

J. Crampton, Specifying and enforcing constraints in role-based access control, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.43-50, 2003.
DOI : 10.1145/775412.775419

P. E. Epstein, Engineering of role/permission assignments, Seventeenth Annual Computer Security Applications Conference, 2002.
DOI : 10.1109/ACSAC.2001.991529

D. F. Ferraiolo, R. D. Kuhn, and R. Chandramouli, Role-Based Access Control, 2003.

M. P. Gallaher, A. C. O-'connor, and B. Kropp, The Economic Impact of Role-Based Access Control, 2002.

B. Ganter and R. Wille, Formal Concept Analysis : Mathematical Foundations, 1997.

F. Geerts, B. Goethals, T. Mielikäinen, ». Databases, I. et al., Tiling Databases, Discovery Science, pp.278-289, 2004.
DOI : 10.1007/978-3-540-30214-8_22

T. Jaeger, Managing access control complexity using metrices, 6th ACM Symposium on Access Control Models and Technologies Proceedings, pp.131-139, 2001.

M. Kuhlmann, D. Shohat, and G. Schimpf, Role mining - revealing business roles for security administration using data mining technology, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.179-186, 2003.
DOI : 10.1145/775412.775435

B. W. Lampson, ». Protection, and S. Oper, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

N. Li, J. Byun, and E. Bertino, A Critique of the ANSI Standard on Role-Based Access Control, IEEE Security & Privacy Magazine, vol.5, issue.6, pp.41-49, 2007.
DOI : 10.1109/MSP.2007.158

G. Neumann and M. Strembeck, A scenario-driven role engineering process for functional RBAC roles, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.33-42, 2002.
DOI : 10.1145/507711.507717

L. Nourine and O. Raynaud, A fast incremental algorithm for building lattices, Journal of Experimental & Theoretical Artificial Intelligence, vol.24, issue.2-3, pp.2-3, 2002.
DOI : 10.1016/S0020-0190(99)00108-8

N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal, Discovering Frequent Closed Itemsets for Association Rules, ICDT, pp.398-416, 1999.
DOI : 10.1007/3-540-49257-7_25

URL : https://hal.archives-ouvertes.fr/hal-00467747

H. Roeckle, G. Schimpf, and R. Weidinger, Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.103-110, 2000.
DOI : 10.1145/344287.344308

J. Vaidya, V. Atluri, and Q. Guo, The role mining problem, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.175-184, 2007.
DOI : 10.1145/1266840.1266870

J. Vaidya, V. Atluri, and J. Warner, mining roles using subset enumeration, 13th ACM conference on Computer and Communications Security, CCS'06, pp.144-153, 2006.

R. Wille, Conceptual graphs and formal concept analysis, 5th International Conference on Conceptual Structures, ICCS'97, pp.290-303, 1997.
DOI : 10.1007/BFb0027878

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.3438