Research Article

A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

Figure 5

Resource utilizations when no new users joined in.
805923.fig.005