Research Article

Trusted Computing Strengthens Cloud Authentication

Figure 18

Security level, Subject, and object of the proposed model.
260187.fig.0018