Fig. 7From: A risk assessment model for selecting cloud service providersSecurity risk for CSP-CSC pairsBack to article page