Fig. 3From: Creeper: a tool for detecting permission creep in file system access controlsAnalysis (iterative Jenks) timeBack to article page