Fig. 9From: Security governance as a service on the cloudProcess triggered when data leak detectedBack to article page