Fig. 5From: Similarity testing for role-based access control systemsTesting Tree of an FSM(P)Back to article page