Fig. 2
From: Identifying high-risk over-entitlement in access control policies using fuzzy logic
![Fig. 2](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2Fs42400-022-00112-1/MediaObjects/42400_2022_112_Fig2_HTML.png)
Fuzzy view of considering user trustworthiness and object sensitivity
From: Identifying high-risk over-entitlement in access control policies using fuzzy logic
Fuzzy view of considering user trustworthiness and object sensitivity