Fig. 6
From: Similarity testing for role-based access control systems

Comparison of test prioritization techniques - schematic overview
From: Similarity testing for role-based access control systems
Comparison of test prioritization techniques - schematic overview