How to Break Access Control in a Controlled Manner | IEEE Conference Publication | IEEE Xplore