Fig. 3From: An efficient attribute-based hierarchical data access control scheme in cloud computingAn instance of the hierarchical access control processBack to article page