Fig. 3From: Comprehensive evaluation of key management hierarchies for outsourced dataA resource graphBack to article page