Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Data usage and access control in industrial data spaces: Implementation using FIWARE
In recent years, a new business paradigm has emerged which revolves around effectively
extracting value from data. In this scope, providing a secure ecosystem for data sharing that …
extracting value from data. In this scope, providing a secure ecosystem for data sharing that …
[HTML][HTML] COVID-19 & privacy: Enhancing of indoor localization architectures towards effective social distancing
The way people access services in indoor environments has dramatically changed in the
last year. The countermeasures to the COVID-19 pandemic imposed a disruptive …
last year. The countermeasures to the COVID-19 pandemic imposed a disruptive …
GDPR-based user stories in the access control perspective
Because of GDPR's principle of “data protection by design and by default”, organizations
who wish to stay lawful have to re-think their data practices. Access Control (AC) can be a …
who wish to stay lawful have to re-think their data practices. Access Control (AC) can be a …
Data protection by design in the context of smart cities: A consent and access control proposal
The growing availability of mobile devices has lead to an arising development of smart cities
services that share a huge amount of (personal) information and data. Without accurate and …
services that share a huge amount of (personal) information and data. Without accurate and …
[PDF][PDF] How to Improve the GDPR Compliance through Consent Management and Access Control.
This paper presents a privacy-by-design solution based on Consent Manager (CM) and
Access Control (AC) to aid organizations to comply with the GDPR. The idea is to start from …
Access Control (AC) to aid organizations to comply with the GDPR. The idea is to start from …
A privacy-by-design architecture for indoor localization systems
The availability of mobile devices has led to an arising development of indoor location
services collecting a large amount of sensitive information. However, without accurate and …
services collecting a large amount of sensitive information. However, without accurate and …
[PDF][PDF] A Life Cycle for Authorization Systems Development in the GDPR Perspective.
Abstract The General Data Protection Regulation (GDPR) defines the principle of Integrity
and Confidentiality, and implicitly calls for the adoption of authorization systems for …
and Confidentiality, and implicitly calls for the adoption of authorization systems for …
[PDF][PDF] The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities.
The General Data Protection Regulation (GDPR) is changing how Personal Data should be
processed. Using Access Control Systems (ACSs) and their specific policies as practical …
processed. Using Access Control Systems (ACSs) and their specific policies as practical …
Data Consent Management: A Blockchain Solution for User Empowerment and Trust
In this article, we present a blockchain solution to address the challenges of responsible
consent management of personal identifiable information (PII). Our approach is based on …
consent management of personal identifiable information (PII). Our approach is based on …
Accountability in the A posteriori access control: A requirement and a mechanism
The a posteriori access control is a flexible type of access control in which policy violations
are deterred by applying accountability. However, the definition of the accountability process …
are deterred by applying accountability. However, the definition of the accountability process …