Filters








4,779 Hits in 10.6 sec

An Automatically Privacy Protection Solution for Implementing the Right to Be Forgotten in Embedded System

Yanan Zhao, Nong Si, Yu Sun, Xin Gao, Haopeng Tong, Geng Yuan
2022 IEEE Access  
This paper proposes a Resilient Tag-based Privacy Protection (RTPP) scheme for embedded systems.  ...  The security proof and performance evaluation show that the proposed RTPP scheme is provable secure in the automatic privacy lifecycle tuning model for embedded systems and efficient in practice.  ...  APPROACH TO ''AUTO-FORGOTTEN'' IMPLEMENTATION FOR EMBEDDED SYSTEM One way to protect private data in storage and achieve an automatic deletion to implement the ''right to be forgotten'' is to limit users  ... 
doi:10.1109/access.2022.3162238 fatcat:arkf5hsr2zeslcx4bjsunk76c4

A peer-to-peer agent community for digital oblivion in online social networks

Klara Stokes, Niklas Carlsson
2013 2013 Eleventh Annual Conference on Privacy, Security and Trust  
Participants form a peerbased agent community, which agree on protecting the privacy of individuals who request images to be forgotten.  ...  The system distributes and maintains up-to-date information on oblivion requests, and implements a filtering functionality when accessing an underlying online social network.  ...  The authors would like to thank David Megías for useful suggestions. The first author is financed by the Swedish government through the National Graduate School in Computer Science (CUGS).  ... 
doi:10.1109/pst.2013.6596043 dblp:conf/pst/StokesC13 fatcat:uigb27lwtzhctce44ebjuxzwwa

Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects

Renata M. de Carvalho, Camillo Del Prete, Yod Samuel Martin, Rosa M. Araujo Rivero, Melek Önen, Francesco Paolo Schiavo, Ángel Cuevas Rumín, Haralambos Mouratidis, Juan C. Yelmo, Maria N. Koukovini
2020 SN Computer Science  
Confidence in information and communication technology services and systems is crucial for the digital society which we live in, but this confidence is not possible without privacy-enhancing tools and  ...  specific, operational solutions for the identified challenges.  ...  The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material.  ... 
doi:10.1007/s42979-020-00218-8 fatcat:vnxfogwk5zburkmddhiweld75a

Protecting citizens' personal data and privacy: a joint effort from GDPR EU cluster research projects

Renata Medeiros De Carvalho, Camilo Del Prete, Yod Samuel Martin, Rosa M. Araujo Rivero, Melek Önen, Francesco Paolo Schiavo, Angel Cuevas Rumín, Haralambos Mouratidis, Juan C. Yelmo, Maria N. Koukovini
2020 Zenodo  
Confidence in information and communication technology services and systems is crucial for the Digital Society which we live in, but this confidence is not possible without privacy-enhancing tools and  ...  specific, operational solutions for the identified challenges.  ...  Acknowledgments The authors have received funding within:  ... 
doi:10.5281/zenodo.4486290 fatcat:l2ayu2wkfvdudisnmhbdxvs4qu

Consent by GDPR vs. Blockchain

Bruno Moslavac
2020 Revista Acadêmica Escola Superior do Ministério Público do Ceará  
data, voluntarily put into the chain by another subject in the same "chain" and the "right to be forgotten" isn't absolute right.  ...  The role of consent in personal data protection today is probably the first question for researches on how it impacts in our daily lives, ordinarily or on-line.  ...  protection or personal data protection regarding the right to be forgotten.  ... 
doi:10.54275/raesmpce.v12i1.22 fatcat:upfaipp325bdxhvydugykdnmwm

Studying Data Privacy Management in Small and Medium-Sized IT Companies

Marko Jantti
2020 2020 14th International Conference on Innovations in Information Technology (IIT)  
ACKNOWLEDGMENT We would like to thank the case organization's representatives for valuable inputs and interviews that helped us to perform this study.  ...  This paper is based on research in Digiteknologian TKI-ympäristö A74338 (ERDF, Regional Council of Pohjois-Savo).  ...  A11: We have been ready beforehand and GDPR issues have been in our control for example how right to be forgotten can work in patient information systems.  ... 
doi:10.1109/iit50501.2020.9299050 fatcat:tjfoa4ycgfdj7npkpwb5vckkuy

Privacy by Design and Language Resources

Pawel Kamocki, Andreas Witt
2020 International Conference on Language Resources and Evaluation  
Privacy by Design (also referred to as Data Protection by Design) is an approach in which solutions and mechanisms addressing privacy and data protection are embedded through the entire project lifecycle  ...  , appropriate measures and safeguards to implement data protection principles and protect the rights of the data subject.  ...  The Commission defined Privacy by Design as an approach in which "privacy and data protection are embedded throughout the entire life cycle of technologies, from the early design stage to their deployment  ... 
dblp:conf/lrec/KamockiW20 fatcat:ptiivpg6anbyln27vsmqp6qdo4

Privacy and the regulation of 2012

Luiz Costa, Yves Poullet
2012 Computer Law and Security Review  
Privacy Right to be forgotten Supervisory authority Data protection by default Data protection by design Data protection impact assessment a b s t r a c t  ...  The right to informational self-determination lies at the root of the right to be forgotten.  ...  The effectiveness of the right to be forgotten must also rely on a techno-legal approach. Which technical solutions should be adopted to assure the erasure and blocking data on Internet servers?  ... 
doi:10.1016/j.clsr.2012.03.015 fatcat:mur4dmrj3rew7log5j4exa3yc4

Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces

Iwona Karasek-Wojciechowicz
2021 Journal of Cybersecurity  
Solutions suggested in this article aim to induce the shaping of permissionless DLT-based networks in ways that at the same time would secure the protection of personal data according to the GDPR rules  ...  The tool should be optional for networks as long as another effective AML/CFT measures are accessible for the intermediaries or for the government in relation to a given network.  ...  Acknowledgements The author thanks to the two anonymous reviewers for their useful comments and critique.  ... 
doi:10.1093/cybsec/tyab004 fatcat:n2uryrm5wncmlj2he24nraimfu

Privacy.tag

Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, YongGuang Zhang, Feng Zhao
2014 Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems - SenSys '14  
, to mitigate the public's privacy concern, and ultimately create a healthy photo-sharing ecosystem in the long run.  ...  We further design an exemplar Privacy.Tag using customized yet compatible QR-code, and implement the Protocol and study the technical feasibility of our proposal.  ...  Acknowledgments The work of Bo is supported in part by the US National Science  ... 
doi:10.1145/2668332.2668339 dblp:conf/sensys/BoSLLZZ14 fatcat:n4tfwkg42fgxzmp5cskthpkb64

Privacy Impact Assessment Template for Provenance

Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hubner, Heather S. Packer, Hans Hedbom, Luc Moreau
2016 2016 11th International Conference on Availability, Reliability and Security (ARES)  
In this paper, we provide a Privacy Impact Assessment (PIA) template for identifying imminent privacy threats that arise from provenance graphs in an application-agnostic setting.  ...  The PIA template identifies privacy threats, lists potential countermeasures, helps to manage personal data protection risks, and maintains compliance with privacy data protection laws and regulations.  ...  data, the right to restrict its processing, and the right to be forgotten in a timely manner.  ... 
doi:10.1109/ares.2016.95 dblp:conf/IEEEares/ReubenMFPHM16 fatcat:psysbk6urvfcrcfevzagof76ay

Secured by Blockchain: Safeguarding Internet of Things Devices

Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
2019 IEEE Consumer Electronics Magazine  
Towards this direction, privacy and data protection aspects of blockchain solutions are also presented and are linked to regulatory framework provisions.  ...  Blockchain is a disruptive technology that has been characterised to be the next big thing and has already gained a broad recognition by experts in diverse fields.  ...  Konstantinos Limniotis (klimniotis@dpa.gr) is an ICT auditor at the Hellenic Data Protection Authority, Greece. His research interests include cryptography and personal data protection.  ... 
doi:10.1109/mce.2019.2892221 fatcat:cw6syfearncuzkmp76im4g2z3a

Preserving Privacy in Speaker and Speech Characterisation

Andreas Nautsch, Abelino Jiménez, Amos Treiber, Jascha Kolberg, Catherine Jasserand, Els Kindt, Héctor Delgado, Massimiliano Todisco, Mohamed Amine Hmani, Aymen Mtibaa, Mohammed Ahmed Abdelraheem, Alberto Abad (+11 others)
2019 Computer Speech and Language  
Whereas many privacy-preserving technologies have been developed for other biometric characteristics, very few solutions have been proposed to protect privacy in the case of speech signals.  ...  It then establishes the requirements for effective privacy preservation, reviews generic cryptography-based solutions, followed by specific techniques that are applicable to speaker characterisation (biometric  ...  2050 Privacy and Trust for Mobile Users; the Horizon 2020 Victoria research project (grant agreement SEC-740754); research funds received from the French Agence Nationale de la Recherche-pl2X-sim-(ANR  ... 
doi:10.1016/j.csl.2019.06.001 fatcat:lgq6bz2y5zepvfbrfznhboplha

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks [article]

Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou
2021 arXiv   pre-print
However, OSN image privacy itself is quite complicated, and solutions currently in place for privacy management in reality are insufficient to provide personalized, accurate and flexible privacy protection  ...  The resulting analysis describes an intelligent privacy firewall for closed-loop privacy management. We also discuss the challenges and future directions in this area.  ...  A satisfactory privacy management system in modern OSN image sharing should seriously respect the users' right to be forgotten, which is required by the European General Data Protection Regulation (GDPR  ... 
arXiv:2008.12199v2 fatcat:vxv6rsnyavesjiw2bbnc4jzsiy

A Socio-Technical Approach to Biometric Technology Deployment in Schools

Rachida Parks, Esther Mead
2014 Americas Conference on Information Systems  
These concerns are governed by the Family Educational Rights and Privacy Act (FERPA), which is a law established to protect the privacy of student education records.  ...  The research has implications to schools, parents, lawmakers, vendors and privacy rights advocates.  ...  the protection of privacy and from fraud: "Tokens may be lost, stolen, forgotten, or misplaced, and a PIN may be forgotten by a valid user or guessed by an impostor.  ... 
dblp:conf/amcis/ParksM14 fatcat:eeripnflvjg6dmwyhdsmt7vifm
« Previous Showing results 1 — 15 out of 4,779 results