Fig. 4From: Comprehensive evaluation of key management hierarchies for outsourced data(i) An example CPLs, and (ii) A resource hierarchyBack to article page