Fig. 7From: Adaptive identity and access management—contextual data based policiesDetection of SAP power users (http://www.nexis-secure.com)Back to article page