Fig. 6From: Identifying high-risk over-entitlement in access control policies using fuzzy logicEmpirical analysis resultsBack to article page