Summary
It provides a first version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses. (T2.1, T2.3)
More information & hyperlinks