Fig. 12From: Comprehensive evaluation of key management hierarchies for outsourced dataAfter revoking read access of resource d from user BBack to article page