Research Article

A Reputation-Based Identity Management Model for Cloud Computing

Figure 4

Schematic of the standard access process and Pseudonym Disclosure.
(a)
(b)