Fig. 4From: Sandbox security model for Hadoop file systemFlowchart to represent implementation of Sandbox securityBack to article page