Fig. 14From: Comprehensive evaluation of key management hierarchies for outsourced dataAverage elapse time of one grant/revoke operationBack to article page