Fig. 6
From: Comprehensive evaluation of key management hierarchies for outsourced data

A user graph over a set {A,B,C,D} of four users
From: Comprehensive evaluation of key management hierarchies for outsourced data
A user graph over a set {A,B,C,D} of four users