Fig. 1From: Automated extraction of attributes from natural language attribute-based access control (ABAC) PoliciesThe authorization policy lifecycle (adopted from Brossard et al. (2017)). *Asterisk marks the beginning of the cycleBack to article page