Skip to main content

Table 6 RBAC policies characteristics

From: Similarity testing for role-based access control systems

ID

RBAC policy name

U

R

S u

D u

S r

D r

SSoD

DSoD

Mutants

P01

01_Masood2010Example1

2

1

∙

∙

∙

∙

  

9

P02

02_SeniorTraineeDoctor

2

2

∙

∙

∙

∙

∙

 

17

P03

03_ExperiencePointsv2

2

4

  

∙

 

∙

∙

11

P04

04_users11roles2v2

11

2

∙

 

∙

 

∙

 

28

P05

05_Masood2009P2v2

2

5

∙

∙

 

∙

∙

∙

48