Fig. 2From: Admission control policy and key agreement based on anonymous identity in cloud computingThe RL model is used in the proposed task admission control policy algorithmBack to article page