| Configuration | ||||
|---|---|---|---|---|
| Algorithm | Metric | |||
|
|
|
|||
| Pre-Filters | ||||
|---|---|---|---|---|
| Client | Client, On-Premise | On-premise | On-Premise, CSP | CSP |
|
|
|
|
|
| Trust Assumptions | |||||
|---|---|---|---|---|---|
| Malicious Insider (On-premise) | Malicious Insider (CSP) | MitM (Client, On-premise) | MitM (Client, CSP) | MitM (On-premise, CSP) | MatD (Client) |
|
|
|
|
|
|
|
| Scenario Requirements on Goals | ||||||||
|---|---|---|---|---|---|---|---|---|
Redundancy |
Scalability |
Reliability |
Maintenance |
DoS Resilience |
Vendor Lock-in |
On-premise Savings |
CSP Savings |
|
| Weight | ||||||||
|
Threshold Penalty |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
| Scenario Requirements on Protection Levels | ||||||||
|---|---|---|---|---|---|---|---|---|
Confidentiality |
Integrity |
Availability |
||||||
| Weight | ||||||||
|
Threshold Penalty |
None Hard Soft |
None Hard Soft |
None Hard Soft |
|||||
| Best Architectures |
|---|