The subdirectory below contain four different examples presented in the paper, "Automated Trust Negotiation in Attribute-based Access Control: Protocol, Procedures, and Strategies"(Table 7, p. 33). In all four cases, the USS Howard (USSH) is requesting a resource from the Swedish Admiralty (SAdmir). The training is used with the history-based strategy only. sadmir-ussh_default - SAdmir and USSH negotiate using breadth first strategy sadmir-ussh_ussh - SAdmir and USSH negotiate using the history-based strategy, trained for USSH only sadmir-ussh_visby - SAdmir and USSH negotiate using the history-based strategy, trained for Visby1 only sadmir-ussh_both - SAdmir and USSH negotiate using the history-based strategy, trained for both USSH & Visby1 Each subdirectory contain a shell script named go, which can be used to launch the visualization.