“…Our approach is not limited to that kind of data only (i.e., personal data, as explained later), but is rather capable of operating with any kind of sensitive data. Second, we give a brief overview on previous work, i.e., the main components from RADAR [24], which we extended, updated and enhanced for our approach. Third, we explain what kind of adaptations are possible within our approach.…”