Fig. 9From: Comprehensive evaluation of key management hierarchies for outsourced dataModified example of minimal vertex user hierarchy (i) before, and (ii) after granting read accessBack to article page