Fig. 3From: Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolationOverall methodology for architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolationBack to article page