Skip to main content

Table 7 Comparison of techniques

From: Creeper: a tool for detecting permission creep in file system access controls

Dataset

No. of users with Creep (Manual)

No. of users with Creep (ntfs-r)

No. of users with Creep (Creeper)

Directory

C

I

M

C

I

M

C

I

M

1

0

0

0

0

0

0

0

0

0

2

8

0

7

8

7

7

14

1

0

3

0

0

0

0

0

0

0

0

0

4

2

0

8

6

0

4

10

0

0

5

0

0

3

3

79

0

3

0

0

  1. C = Correct, I = Incorrect, and M = Missed