Research Article

Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control

Figure 8

The resource availability comparison between the ratio of reputed and malicious users.