Fig. 16From: Comprehensive evaluation of key management hierarchies for outsourced dataElapsed time of one grant read subscription operationBack to article page