Tools for protecting confidentiality and integrity of data and access

Summary
It provides a first version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses. (T2.1, T2.3)