Research Article

Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control

Figure 5

Trust value for reputed actions and uncertain actions.