Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Figure 2

The average granted ratio of requests.