Fig. 2From: Creeper: a tool for detecting permission creep in file system access controlsExamination (χ2) timeBack to article page