Fig. 5From: Automated extraction of attributes from natural language attribute-based access control (ABAC) PoliciesDependency tree representationBack to article page