Research Article

Application of Cloud Computing Technology in Computer Secure Storage

Figure 6

Simple attack tree model of unix system.