Applying a model of configuration complexity to measure security impact on IT procedures | IEEE Conference Publication | IEEE Xplore