Figure 14From: Handling compromised components in an IaaS cloud installation A simple FSM model for transitions between different trust levels of a component. Back to article page