Review Article

Comparison of Adaptive Information Security Approaches

Figure 4

Authorisation pattern.
482949.fig.004