Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.
Preserving Privacy in Data Outsourcing - Sara Foresti
Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.