Resolving least privilege violations in software architectures | IEEE Conference Publication | IEEE Xplore