Fig. 10From: Comprehensive evaluation of key management hierarchies for outsourced dataModified example of minimal vertex user hierarchy after revoking user DBack to article page