Fig. 2From: Identifying high-risk over-entitlement in access control policies using fuzzy logicFuzzy view of considering user trustworthiness and object sensitivityBack to article page