Managing key hierarchies for access control enforcement: Heuristic approaches