Review Article

SoK: Context and Risk Aware Access Control for Zero Trust Systems

Figure 5

QRAAC [83].