Generating Permission-Based Security Policies | IEEE Conference Publication | IEEE Xplore