Hunting abnormal configurations for permission-sensitive role mining | IEEE Conference Publication | IEEE Xplore