Fig. 2From: Adaptive identity and access management—contextual data based policiesAdvanced architecture of identity and access management systemsBack to article page