Skip to main content

Advertisement

Table 1 Scores form analysing a directory structure where “Test user” was deliberately modified to mimic an instance of permission creep

From: Creeper: a tool for detecting permission creep in file system access controls

Subject Permission \(\chi ^{2}_{subject}\) Class No. Potential Creep
Test user Read & Execute, Full control 1 0 yes
Users Read & Execute 468 1 no
System Full control 1080 2 no
Admin Full control 1120 2 no