Fig. 6From: Similarity testing for role-based access control systemsComparison of test prioritization techniques - schematic overviewBack to article page