Fig. 8From: Comprehensive evaluation of key management hierarchies for outsourced data(i) Example ACLs with read authorization, and (ii) A minimal vertex user hierarchyBack to article page