From: Similarity testing for role-based access control systems
Pairs (t i ,t j ) | d s d (t i ,t j ) | AppValue(P,t i ,t j ) | PriorityValue(P,t i ,t j ) | d r s (P,t i ,t j ) |
---|---|---|---|---|
(t0,t1) | 2.0 | 1.55 | 1.0 | 4.55 |
(t0,t2) | 2.0 | 2.55 | 1.0 | 5.55 |
(t0,t3) | 2.0 | 3.77 | 2.0 | 7.77 |
(t1,t2) | 2.0 | 2.55 | 1.0 | 5.55 |
(t1,t3) | 2.0 | 3.77 | 2.0 | 7.77 |
(t2,t3) | 2.0 | 4.77 | 2.0 | 8.77 |