Results 261 to 270 of about 1,909,176 (306)
Personal Data Protection in Telemedicine
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A framework for personal data protection in the IoT
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016IoT personal devices are having an undoubtedly explosive growth as many different products become available on the market such as smart watches, contact lenses, fitness bands, microchips under skin, among others. These devices and their related applications process the collected sensor data and use them to provide services to their users; in addition ...
TORRE, ILARIA +3 more
openaire +1 more source
Google and Personal Data Protection
2012This chapter discusses the interplay between the European personal data protection regime and two specific Google services, Interest-Based Advertising and Google Street View. The chapter assesses first the applicability of the Data Protection Directive, then jurisdictional issues, the principles relating to data quality, whether there is a legitimate ...
van der Sloot, B. +1 more
openaire +2 more sources
General data protection regulation — Protection of personal data in an organisation
2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2018Personal data represent all data (identifiers) relating to an identified individual. Identifiers can include first name and last name, network IP address, MAC address, GPS location, telephone number, personal ID, biometric data and other relevant data in connection with personal identity.
Aleksandar Skendzic +2 more
openaire +1 more source
Protection of Personal Data Using Anonymization
2021Data quality and security issues are very closely related. To ensure a high level of reliability in distributed systems and resilience from external attacks, the process of consolidating distributed data is critical. For consolidated systems, the access process relies heavily on data preprocessing, which, in turn, allows them to be anonymized.
Alexander V. Bogdanov +8 more
openaire +1 more source
Personalized Privacy Protection for Transactional Data
2014Privacy protection in publication of transactional data is an important problem. However,the bulk of existing methods focus on a universal approach that exerts the same amount of preservation for all users and all sensitive values, without considering different requirements of users and different sensitivity of concrete attribute values.
Li-e Wang 0001, Xianxian Li
openaire +1 more source
Privacy Management and Protection of Personal Data
2015Abstract In this chapter, we will give detailed consideration to the ways in which the use of technology can infringe on privacy. We will consider technologies that have been around for the last decade revolutionizing the way in which we buy, communicate, contribute and obtain information, and emerging technologies, which use communicating objects ...
Laurent, Maryline +1 more
openaire +3 more sources
Cryptographic Protection of Personal Data Cards
1983Plastic cards for different types of stored data are in wide use at present. Examples are credit cards and cards bearing access control information for automatic teller machines. More powerful devices with non-volatile read/write memory of several kilobytes, possibly with some intelligence, (Personal Data Cards), open new fields of applications in ...
Christian Müller-Schloer +1 more
openaire +1 more source
Standardizing Personal Data Protection
Abstract The Standardizing Personal Data Protection is the first book focusing on the role of technical standards in protecting individuals as regards the processing of their personal data. Through the lenses of legal pluralism and Transnational Private Regulation, the book studies the interaction of standardization as a private semi ...openaire +2 more sources

