Figure 6From: Access control as a service for the CloudMalicious entity acting as a consumer.Back to article page