Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach | IEEE Conference Publication | IEEE Xplore