Report on encryption-based techniques and policy enforcement

Summary
It provides a first version of the techniques for policy enforcement, based on the basic protection techniques developed in W4.1. (T4.2)