Fig. 1From: A survey of compliance issues in cloud computingClass diagram for HIPAA’s security rule [21]Back to article page