Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

GM Garrido, J Sedlmeir, Ö Uludağ, IS Alaoui… - Journal of Network and …, 2022 - Elsevier
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …

An ai-assisted approach for checking the completeness of privacy policies against gdpr

D Torre, S Abualhaija, M Sabetzadeh… - 2020 IEEE 28th …, 2020 - ieeexplore.ieee.org
Privacy policies are critical for hel** individuals make informed decisions about their
personal data. In Europe, privacy policies are subject to compliance with the General Data …

AI-enabled automation for completeness checking of privacy policies

O Amaral, S Abualhaija, D Torre… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Technological advances in information sharing have raised concerns about data protection.
Privacy policies contain privacy-related requirements about how the personal data of …

Monitoring the GDPR

E Arfelt, D Basin, S Debois - … : 24th European Symposium on Research in …, 2019 - Springer
Abstract The General Data Protection Regulation (GDPR) has substantially strengthened the
requirements for data processing systems, requiring audits at scale. We show how and to …

Towards privacy compliance: A design science study in a small organization

ZS Li, C Werner, N Ernst, D Damian - Information and Software Technology, 2022 - Elsevier
Context: Complying with privacy regulations has taken on new importance with the
introduction of the EU's General Data Protection Regulation (GDPR) and other privacy …

Modeling data flow constraints for design-time confidentiality analyses

S Hahner, S Seifermann, R Heinrich… - 2021 IEEE 18th …, 2021 - ieeexplore.ieee.org
With the increase in connectedness and the growing volume of data, ensuring confidentiality
becomes increasingly critical. Data-driven analyses try to cope with this complexity by …

Flaws in flows: Unveiling design flaws via information flow analysis

K Tuma, R Scandariato, M Balliu - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
This paper presents a practical and formal approach to analyze security-centric information
flow policies at the level of the design model. Specifically, we focus on data confidentiality …

[HTML][HTML] Real-world K-Anonymity applications: The KGen approach and its evaluation in fraudulent transactions

D De Pascale, G Cascavilla, DA Tamburri… - Information Systems, 2023 - Elsevier
K-Anonymity is a property for the measurement, management, and governance of the data
anonymization. Many implementations of k-anonymity have been described in state of the …

Runtime and design time completeness checking of dangerous android app permissions against GDPR

R McConkey, O Olukoya - IEEE Access, 2023 - ieeexplore.ieee.org
Data and privacy laws, such as the GDPR, require mobile apps that collect and process the
personal data of their citizens to have a legally-compliant policy. Since these mobile apps …

How do we evaluate self-adaptive software systems?: A ten-year perspective of SEAMS

I Gerostathopoulos, T Vogel, D Weyns… - … for Adaptive and Self …, 2021 - ieeexplore.ieee.org
With the increase of research in self-adaptive systems, there is a need to better understand
the way research contributions are evaluated. Such insights will support researchers to …