Detecting and resolving misconfigurations in role based access control

Conference Papers