Fig. 5From: Identifying high-risk over-entitlement in access control policies using fuzzy logicSchematic illustrating the multiple components and information flowBack to article page