Research Article

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique

Figure 5

under different attribute weights.
(a)
(b)