Counter Example Trace: Role to check REACHABILITY: target ==> Step 1: Target User: user108 CAN ASSIGN rule applied to user108: Administrative user to invoke the rule: user6 Role configuration of user108 before applying rule: Professor Role configuration of user108 after applying rule: Professor Dean ==> Step 2: Target User: user110 CAN ASSIGN rule applied to user110: Administrative user to invoke the rule: user6 Role configuration of user110 before applying rule: Professor Role configuration of user110 after applying rule: Professor Dean ==> Step 3: Target User: user2 CAN REVOKE rule applied to user2: Administrative user to invoke the rule: user1 Role configuration of user2 before applying rule: DeptChair Professor Role configuration of user2 after applying rule: Professor ==> Step 4: Target User: user6 CAN ASSIGN rule applied to user6: Administrative user to invoke the rule: user0 Role configuration of user6 before applying rule: Provost Professor Role configuration of user6 after applying rule: Provost Professor target user6 can REACH target target is REACHABLE