Fig. 6From: Comprehensive evaluation of key management hierarchies for outsourced dataA user graph over a set {A,B,C,D} of four usersBack to article page