Return to Article Details Analysing security risk of a cloud computing system to produce a model for secured business environment Download Download PDF