Fig. 3From: Identifying high-risk over-entitlement in access control policies using fuzzy logicFuzzy logic view of the different system inputBack to article page