Fig. 1From: Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levelsResults of the degree of the fulfillment of the system comparison characteristicsBack to article page