Results 31 to 40 of about 1,097,797 (367)
In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing industry.
Christian Jandl +3 more
doaj +1 more source
Secrecy by Design With Applications to Privacy and Compression
Secrecy by design is examined as an approach to information-theoretic secrecy. The main idea behind this approach is to design an information processing system from the ground up to be perfectly secure with respect to an explicit secrecy constraint.
Yanina Y. Shkel, Rick S. Blum, H. Poor
semanticscholar +1 more source
A Privacy-Aware Zero Interaction Smart Mobility System
Smart cities often rely on technological innovations to improve citizens’ safety and quality of life. This paper presents a novel smart mobility system that facilitates people’s access to public mobility while preserving their privacy.
Stefano Righini +2 more
doaj +1 more source
Buying Private Data without Verification [PDF]
We consider the problem of designing a survey to aggregate non-verifiable information from a privacy-sensitive population: an analyst wants to compute some aggregate statistic from the private bits held by each member of a population, but cannot verify ...
Ghosh, Arpita +3 more
core +3 more sources
Data Protection by Design and by Default : Deciphering the EU’s Legislative Requirements
In this paper, a critical examination is conducted of Article 25 of the European Union’s General Data Protection Regulation (Regulation 2016/679). Bearing the title ʻdata protection by design and by default’, Article 25 requires that core data protection
Lee A. Bygrave
doaj +1 more source
How to make privacy policies both GDPR-compliant and usable [PDF]
It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline.
Renaud, Karen, Shepherd, Lynsay
core +4 more sources
Community clouds within M-commerce: a privacy by design perspective
The paper establishes the link between community clouds and m-commerce. The research questions attempt to provide an understanding of the various shopping domains and their convergence through mobile devices.
Farid Shirazi, Amna Iqbal
doaj +1 more source
Privacy by Design: From Technologies to Architectures - (Position Paper) [PDF]
Existing work on privacy by design mostly focus on technologies rather than methodologies and on components rather than architectures. In this paper, we advocate the idea that privacy by design should also be addressed at the architectural level and be ...
Thibaud Antignac, D. L. Métayer
semanticscholar +1 more source
Dynamic consent management allows a data subject to dynamically govern her consent to access her data. Clearly, security and privacy guarantees are vital for the adoption of dynamic consent management systems.
Muhammad Irfan Khalid +2 more
doaj +1 more source
The essay examines the EU Regulation n.2016/679, that will enter into force as from 2018, ponting out its impact on the Data Protection for workers.The Author assesses the UE Regulation key topics: the need of Risk Analysis and Impact Privacy Assessment ...
Claudia Ogriseg
doaj +1 more source

