Discovering access-control misconfigurations: New approaches and evaluation methodologies. [PDF, BibTeX, ]
Lujo Bauer, Yuan Liang, Michael K. Reiter, and Chad Spensky.
In CODASPY'12: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, February 2012. © ACM DOI:10.1145/2133601.2133613