A methodology to minimise excessively permissive security configurations

- Athauda, Rukshan; Skinner, Geoff; Regan, Brian