Fig. 4From: Adaptive identity and access management—contextual data based policiesInput and output of policy mining algorithmsBack to article page