Figure 4From: Intelligent security and privacy solutions for enabling personalized telepathologyComposition/decomposition of a policy sub-domain [8]Back to article page