Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.