From: Identifying high-risk over-entitlement in access control policies using fuzzy logic
Number of roles | Dir complexity | tpr | fpr | tnr | fnr | Accuracy |
---|---|---|---|---|---|---|
2 | 2 | 0.453 | 0.001 | 0.999 | 0.547 | 0.964 |
3 | 2 | 0.170 | 0.000 | 1.000 | 0.830 | 0.976 |
4 | 2 | 0.328 | 0.000 | 1.000 | 0.672 | 0.971 |
5 | 2 | 0.381 | 0.000 | 1.000 | 0.619 | 0.970 |
2 | 3 | 0.516 | 0.000 | 1.000 | 0.484 | 0.995 |
3 | 3 | 0.436 | 0.000 | 1.000 | 0.564 | 0.998 |
4 | 3 | 0.571 | 0.000 | 1.000 | 0.429 | 0.997 |
5 | 3 | 0.522 | 0.000 | 1.000 | 0.478 | 0.997 |
2 | 4 | 0.636 | 0.000 | 1.000 | 0.364 | 0.999 |
3 | 4 | 0.376 | 0.000 | 1.000 | 0.624 | 1.000 |
4 | 4 | 0.569 | 0.000 | 1.000 | 0.431 | 1.000 |
5 | 4 | 0.488 | 0.000 | 1.000 | 0.512 | 1.000 |
2 | 5 | 0.786 | 0.000 | 1.000 | 0.214 | 1.000 |
3 | 5 | 0.869 | 0.000 | 1.000 | 0.131 | 1.000 |
4 | 5 | 0.689 | 0.000 | 1.000 | 0.311 | 1.000 |
5 | 5 | 0.618 | 0.000 | 1.000 | 0.382 | 1.000 |
Average | 0.526 | 0.000 | 1.000 | 0.474 | 0.992 |