Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Information security applications in smart cities: A bibliometric analysis of emerging research
T Poleto, TCC Nepomuceno, VDH De Carvalho… - Future Internet, 2023 - mdpi.com
This paper aims to analyze the intellectual structure and research fronts in application
information security in smart cities to identify research boundaries, trends, and new …
information security in smart cities to identify research boundaries, trends, and new …
Data protection by design tool for automated GDPR compliance verification based on semantically modeled informed consent
The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection.
Organizations face significant challenges, such as demonstrating compliance (or …
Organizations face significant challenges, such as demonstrating compliance (or …
[HTML][HTML] Prospects of cybersecurity in smart cities
F Almeida - Future Internet, 2023 - mdpi.com
The complex and interconnected infrastructure of smart cities offers several opportunities for
attackers to exploit vulnerabilities and carry out cyberattacks that can have serious …
attackers to exploit vulnerabilities and carry out cyberattacks that can have serious …
Identifying and Evaluating Factors Affecting User Privacy in the Smart City Using the Meta-Synthesis Method and the Fuzzy Dematel Technique
R Bagheri, MZ Nezhad, MHP Rizi… - International Journal of …, 2024 - World Scientific
Smart cities are becoming increasingly popular today due to various digital technologies in
their infrastructure. One of the most critical challenges in the proper implementation and …
their infrastructure. One of the most critical challenges in the proper implementation and …
Collaborative network 5.0: by design human values and human-centred based extended collaborative networks
Abstract Collaborative Networks (CNs) as a new discipline play an important part in the
continuing digital transformation of business and services, taking advantage of Information …
continuing digital transformation of business and services, taking advantage of Information …
[PDF][PDF] The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities.
S Daoudagh, E Marchetti - ICISSP, 2022 - scitepress.org
The General Data Protection Regulation (GDPR) is changing how Personal Data should be
processed. Using Access Control Systems (ACSs) and their specific policies as practical …
processed. Using Access Control Systems (ACSs) and their specific policies as practical …
[HTML][HTML] A Personal Microcomputer as an Access Control Management Platform in Road Transport
P Wójcik, T Neumann - Applied Sciences, 2023 - mdpi.com
For many years, the use of new computer systems to control various elements of everyday
human life has been observed. Separate systems manage access control; others are used …
human life has been observed. Separate systems manage access control; others are used …
User Characterization Strategies in GDPR-Compliant Environments: Beekeeper AG Case Study
Recommendation systems often use pseudonymized personal data, which means that the
names of individuals in their database can only be linked to their information using a …
names of individuals in their database can only be linked to their information using a …
A survey of the smart city data security and privacy-preserving approaches in the Internet of Things
S Akhlaghi, MB Menhaj… - 2024 10th International …, 2024 - ieeexplore.ieee.org
The rapid expansion of IoT technology has given rise to smart cities, but their complex
architecture poses security challenges at various levels. This paper introduces a systematic …
architecture poses security challenges at various levels. This paper introduces a systematic …
Privacy Preservation Mechanisms in Identity Management with Application to IoT
J García Rodríguez - Proyecto de investigación:, 2024 - digitum.um.es
Objectives The main objective is devising, designing and implementing secure, usable and
privacy-preserving digital identity management solutions for both individuals and devices …
privacy-preserving digital identity management solutions for both individuals and devices …