Fig. 2From: Automated identification of sensitive data from implicit user specificationOverall architecture of S3Back to article page