Skip to main content

Advertisement

Table 7 Comparison of techniques

From: Creeper: a tool for detecting permission creep in file system access controls

Dataset No. of users with Creep (Manual) No. of users with Creep (ntfs-r) No. of users with Creep (Creeper)
Directory C I M C I M C I M
1 0 0 0 0 0 0 0 0 0
2 8 0 7 8 7 7 14 1 0
3 0 0 0 0 0 0 0 0 0
4 2 0 8 6 0 4 10 0 0
5 0 0 3 3 79 0 3 0 0
  1. C = Correct, I = Incorrect, and M = Missed