Vulnerability hierarchies in access control configurations | IEEE Conference Publication | IEEE Xplore