A plurality of users may have access to a file. The file is encrypted with
a key. Access for a user to the file is revoked. A new key is generated
from the current key of the file in response to said revocation, and the
file is encrypted with the new key.