Fig. 2From: An efficient attribute-based hierarchical data access control scheme in cloud computingAn instance of the integrated access control structureBack to article page