Fig. 1From: Similarity testing for role-based access control systemsExample of complete FSMBack to article page