Summary
It provides a first version of the techniques for enforcing selective access on outsourced data. (T3.1)
More information & hyperlinks