Lazy revocation in cryptographic file systems | IEEE Conference Publication | IEEE Xplore