Return to Article Details A Study on different flavours of securing shared data with user revocation Download Download PDF