Fig. 1From: Comprehensive evaluation of key management hierarchies for outsourced dataAn example access control matrix as (i) ACLs (ii) CPLsBack to article page