Fig. 2From: Comprehensive evaluation of key management hierarchies for outsourced dataExample hierarchy structures based on (i) ACLs (ii) CPLsBack to article page