Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Figure 1

Architecture and workflow of FBAC.