Summary
Documentation of the design and security techniques for computing on data distributed across multiple data custodians that protect privacy The techniques will be developed based on the use cases and the security and privacy requirements of the project
More information & hyperlinks