Fig. 1From: Identifying high-risk over-entitlement in access control policies using fuzzy logicBinary view of considering user trustworthiness and object sensitivityBack to article page