Home > Symbol Legend

Symbol Legend

Actively Processing

Actively Processing

Attacker

Attacker

Attribute Token

Attribute Token

Business Process/Workflow Logic

Business Process/
Workflow Logic

CPU

CPU

Certificate

Certificate

Certificate Revocation List

Certificate Revocation List

Cloud

Cloud

Cloud Storage Data Management

Cloud Storage Data Management

Cloud StorageData AgingManagement

Cloud Storage
Data Aging
Management

Cloud StorageData PlacementAuditor

Cloud Storage
Data Placement
Auditor

Component or Program

Component or Program

Conflict Symbol

Conflict Symbol

Connection Ports or Virtual Switch

Connection Ports or
Virtual Switch

Core Switch

Core Switch

Dataset

Dataset

Decoupled Service Contract

Decoupled Service Contract

Digital Signature

Digital Signature

Fabric

Fabric

Firewall

Firewall

Firmware

Firmware

Folder

Folder

General Machine Processable Document

General Machine
Processable Document

General Physical Boundary

General Physical Boundary

Hard Disk

Hard Disk

Hard Disk with Enclosure

Hard Disk with Enclosure

Heartbeat Message

Heartbeat Message

Human

Human

Human Readable Document

Human Readable Document

Hypervisor

Hypervisor

Internet

Internet

LUM Masking

LUM Masking

LUN Migration

LUN Migration

LUNs

LUNs

Live Storage Migration

Live Storage Migration

Malicious Component or Program

Malicious Component
or Program

Malicious Service Agent

Malicious Service Agent

Management System

Management System

Memory

Memory

Message

Message

Mobile Computer

Mobile Computer

Mobile Devices

Mobile Devices

Multitenant Application

Multitenant Application

Network Adapter

Network Adapter

Organization

Organization

Pattern or Process Step

Pattern or Process Step

Physical Network Adapter

Physical Network Adapter

Physical Network Device

Physical Network Device

Physical Server

Physical Server

Physical Switch

Physical Switch

Policy

Policy

Private Key

Private Key

Product, System or Application

Product, System
or Application

Public Key

Public Key

RAID-level

RAID-level

RAID-level identifier

RAID-level identifier

Ready-made Environment

Ready-made Environment

Remote Administration System

Remote Administration System

Repository or Storage Device

Repository or
Storage Device

Repository with State Data

Repository with State Data

Resource Cluster

Resource Cluster

Resource Pool

Resource Pool

Router

Router

Schema or Data Model

Schema or Data Model

Security Element or Locked Resource

Security Element or
Locked Resource

Service

Service

Service Agent

Service Agent

Service Composition

Service Composition

Service Contract (Chorded Circle Notation)

Service Contract
(Chorded Circle Notation)

Service Inventory

Service Inventory

Service with State Data (Stateful Service)

Service with State Data
(Stateful Service)

Services

Services

Shared Storage

Shared Storage

Storage Controller

Storage Controller

Storage Device (Internal)

Storage Device (Internal)

Storage Replication

Storage Replication

Top-of-rack Switch

Top-of-rack Switch

Transition Arrow

Transition Arrow

Trusted Attacker

Trusted Attacker

User Interface/Portal

User Interface/Portal

VI Manager

VI Manager

VIM server

VIM server

Virtual Desktop

Virtual Desktop

Virtual Firewall

Virtual Firewall

Virtual Network Device

Virtual Network Device

Virtual Private Network

Virtual Private Network

Virtual Server

Virtual Server

Virtualization Platform

Virtualization Platform

Virtualized Application

Virtualized Application

Wireless Access Point

Wireless Access Point

Workstation

Workstation

Zone or Region

Zone or Region