Fig. 11From: Comprehensive evaluation of key management hierarchies for outsourced data(i) An example minimal vertex resource hierarchy, and (ii) Granting read access for resource c to user CBack to article page