Figure 7From: A multi-level security model for partitioning workflows over federated clouds The six valid cloud mappings. Back to article page