Fig. 5From: Comprehensive evaluation of key management hierarchies for outsourced data(i) Example CPLs, and (ii) A minimal vertex resource hierarchyBack to article page