How to Break Access Control in a Controlled Manner

doi 10.1109/cbms.2006.95