From: Similarity testing for role-based access control systems
ID | RBAC policy name | U | R | S u | D u | S r | D r | SSoD | DSoD | Mutants |
---|---|---|---|---|---|---|---|---|---|---|
P01 | 01_Masood2010Example1 | 2 | 1 | ∙ | ∙ | ∙ | ∙ |  |  | 9 |
P02 | 02_SeniorTraineeDoctor | 2 | 2 | ∙ | ∙ | ∙ | ∙ | ∙ |  | 17 |
P03 | 03_ExperiencePointsv2 | 2 | 4 |  |  | ∙ |  | ∙ | ∙ | 11 |
P04 | 04_users11roles2v2 | 11 | 2 | ∙ |  | ∙ |  | ∙ |  | 28 |
P05 | 05_Masood2009P2v2 | 2 | 5 | ∙ | ∙ |  | ∙ | ∙ | ∙ | 48 |