Figure 8From: Access control as a service for the CloudMalicious entity co-located with a consumer.Back to article page