“…In the context of a role-based access control, for which many modifications and extensions have been proposed [3,4,5,6,7,8,9,10], first of all an analysis of the problem of users' excessive permissions is needed. Obviously, this indicator is decisive in assessing the possibility of unauthorized transmission of information.…”