Advances, Systems and Applications
From: A risk assessment model for selecting cloud service providers
Risk scenario i | Privacy r i | Security s i | Service e i |
---|---|---|---|
P1 | 0 | 0 | 1 |
P2 | 1 | 0 | 0 |
P3 | 1 | 1 | 1 |
P4 | 0 | 1 | 0 |
P5 | 0 | 0 | 1 |
P6 | 1 | 1 | 1 |
P7 | 0 | 0 | 1 |
T1 | 0 | 0 | 1 |
T2 | 1 | 1 | 0 |
T3 | 1 | 1 | 1 |
T4 | 1 | 1 | 1 |
T5 | 1 | 1 | 0 |
T6 | 1 | 1 | 0 |
T7 | 1 | 1 | 0 |
T8 | 0 | 0 | 1 |
T9 | 0 | 0 | 1 |
T10 | 1 | 1 | 0 |
T11 | 1 | 1 | 0 |
T12 | 1 | 1 | 1 |
T13 | 0 | 1 | 0 |
L1 | 1 | 1 | 0 |
L2 | 1 | 0 | 0 |
L3 | 1 | 1 | 0 |
L4 | 0 | 0 | 1 |
N1 | 0 | 0 | 1 |
N2 | 0 | 0 | 1 |
N3 | 0 | 0 | 1 |
N4 | 1 | 1 | 1 |
N5 | 0 | 1 | 0 |
N6 | 0 | 1 | 1 |
N7 | 0 | 1 | 1 |
N8 | 1 | 1 | 1 |
N9 | 1 | 1 | 0 |
N10 | 1 | 1 | 1 |
N11 | 0 | 0 | 1 |