The following publications are possibly variants of this publication:
- Identifying and Resolving Least Privilege Violations in Software ArchitecturesKoen Buyens, Bart De Win, Wouter Joosen. IEEEares 2009: 232-239 [doi]
- Resolving least privilege violations in software architecturesKoen Buyens, Bart De Win, Wouter Joosen. ICSE 2009: 9-16 [doi]
- Improving Least Privilege in Software Architecture by Guided Automated CompartmentalizationKoen Buyens, Bart De Win, Wouter Joosen. sis 2008: 145-150
- Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) ; Analyzing Software Architectures for Least Privilege ViolationsKoen Buyens. PhD thesis, Katholieke Universiteit Leuven, Belgium, 2012. [doi]
- Least privilege analysis in software architecturesKoen Buyens, Riccardo Scandariato, Wouter Joosen. SoSyM, 12(2):331-348, 2013. [doi]
- Composition of least privilege analysis results in software architectures (position paper)Koen Buyens, Riccardo Scandariato, Wouter Joosen. ICSE 2011: 29-35 [doi]