Fig. 2From: Risk and UCON-based access control model for healthcare big dataAccess control policy framework diagramBack to article page