Fig. 7From: Comprehensive evaluation of key management hierarchies for outsourced data(i) Example ACLs with read authorization, (ii) A user tree, and (iii) Minimal vertex user treeBack to article page