| Configuration | ||||
|---|---|---|---|---|
| Algorithm | Metric | |||
|  |  | |||
| Pre-Filters | ||||
|---|---|---|---|---|
| Client | Client, On-Premise | On-premise | On-Premise, CSP | CSP | 
|   |   |         |     |       | 
| Trust Assumptions | |||||
|---|---|---|---|---|---|
| Malicious Insider (On-premise) | Malicious Insider (CSP) | MitM (Client, On-premise) | MitM (Client, CSP) | MitM (On-premise, CSP) | MatD (Client) | 
|  |  |  |  |  |  | 
| Scenario Requirements on Goals | ||||||||
|---|---|---|---|---|---|---|---|---|
| Redundancy | Scalability | Reliability | Maintenance | DoS Resilience | Vendor Lock-in | On-premise Savings | CSP Savings | |
| Weight | ||||||||
| Threshold Penalty | None Hard Soft | None Hard Soft | None Hard Soft | None Hard Soft | None Hard Soft | None Hard Soft | None Hard Soft | None Hard Soft | 
| Scenario Requirements on Protection Levels | ||||||||
|---|---|---|---|---|---|---|---|---|
| Confidentiality | Integrity | Availability | ||||||
| Weight | ||||||||
| Threshold Penalty | None Hard Soft | None Hard Soft | None Hard Soft | |||||
| Best Architectures | 
|---|