Fig. 4From: Identifying high-risk over-entitlement in access control policies using fuzzy logicMembership functions and their relationship to the final risk scoreBack to article page