Fig. 3From: Adaptive identity and access management—contextual data based policiesProposed policy optimization process modelBack to article page