Computing counter-examples for privilege protection losses using security models | IEEE Conference Publication | IEEE Xplore