[HTML][HTML] Information security applications in smart cities: A bibliometric analysis of emerging research

T Poleto, TCC Nepomuceno, VDH De Carvalho… - Future Internet, 2023 - mdpi.com
This paper aims to analyze the intellectual structure and research fronts in application
information security in smart cities to identify research boundaries, trends, and new …

Data protection by design tool for automated GDPR compliance verification based on semantically modeled informed consent

TR Chhetri, A Kurteva, RJ DeLong, R Hilscher, K Korte… - Sensors, 2022 - mdpi.com
The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection.
Organizations face significant challenges, such as demonstrating compliance (or …

[HTML][HTML] Prospects of cybersecurity in smart cities

F Almeida - Future Internet, 2023 - mdpi.com
The complex and interconnected infrastructure of smart cities offers several opportunities for
attackers to exploit vulnerabilities and carry out cyberattacks that can have serious …

Identifying and Evaluating Factors Affecting User Privacy in the Smart City Using the Meta-Synthesis Method and the Fuzzy Dematel Technique

R Bagheri, MZ Nezhad, MHP Rizi… - International Journal of …, 2024 - World Scientific
Smart cities are becoming increasingly popular today due to various digital technologies in
their infrastructure. One of the most critical challenges in the proper implementation and …

Collaborative network 5.0: by design human values and human-centred based extended collaborative networks

E Marchetti, S Nikghadam-Hojjati, J Barata - Working Conference on …, 2023 - Springer
Abstract Collaborative Networks (CNs) as a new discipline play an important part in the
continuing digital transformation of business and services, taking advantage of Information …

[PDF][PDF] The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities.

S Daoudagh, E Marchetti - ICISSP, 2022 - scitepress.org
The General Data Protection Regulation (GDPR) is changing how Personal Data should be
processed. Using Access Control Systems (ACSs) and their specific policies as practical …

[HTML][HTML] A Personal Microcomputer as an Access Control Management Platform in Road Transport

P Wójcik, T Neumann - Applied Sciences, 2023 - mdpi.com
For many years, the use of new computer systems to control various elements of everyday
human life has been observed. Separate systems manage access control; others are used …

User Characterization Strategies in GDPR-Compliant Environments: Beekeeper AG Case Study

J Mancera, L Terén, E Portmann - 2024 Tenth International …, 2024 - ieeexplore.ieee.org
Recommendation systems often use pseudonymized personal data, which means that the
names of individuals in their database can only be linked to their information using a …

A survey of the smart city data security and privacy-preserving approaches in the Internet of Things

S Akhlaghi, MB Menhaj… - 2024 10th International …, 2024 - ieeexplore.ieee.org
The rapid expansion of IoT technology has given rise to smart cities, but their complex
architecture poses security challenges at various levels. This paper introduces a systematic …

Privacy Preservation Mechanisms in Identity Management with Application to IoT

J García Rodríguez - Proyecto de investigación:, 2024 - digitum.um.es
Objectives The main objective is devising, designing and implementing secure, usable and
privacy-preserving digital identity management solutions for both individuals and devices …