Configuration Cases in Typical Permission Control Scenarios