Review Article

SoK: Context and Risk Aware Access Control for Zero Trust Systems

Figure 7

Trust matrix [84].