Skip to main content
. 2019 Apr 20;19(8):1884. doi: 10.3390/s19081884

Figure 4.

Figure 4

An Example Resource Tree and the Access Control Approaches in the Proposed Framework.