Fig. 2From: Similarity testing for role-based access control systemsExamples of FSM Mutants. a FSM mutant - CIS. b FSM mutant - CO. c FSM mutant - CTS. d FSM mutant - AESBack to article page