Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Figure 4

under different thresholds.
(a)
(b)
(c)