Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Figure 3

of benign and malicious users.