Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …
recent years because of their potential to improve data availability and unlock new business …
An ai-assisted approach for checking the completeness of privacy policies against gdpr
Privacy policies are critical for hel** individuals make informed decisions about their
personal data. In Europe, privacy policies are subject to compliance with the General Data …
personal data. In Europe, privacy policies are subject to compliance with the General Data …
AI-enabled automation for completeness checking of privacy policies
Technological advances in information sharing have raised concerns about data protection.
Privacy policies contain privacy-related requirements about how the personal data of …
Privacy policies contain privacy-related requirements about how the personal data of …
Monitoring the GDPR
Abstract The General Data Protection Regulation (GDPR) has substantially strengthened the
requirements for data processing systems, requiring audits at scale. We show how and to …
requirements for data processing systems, requiring audits at scale. We show how and to …
Towards privacy compliance: A design science study in a small organization
Context: Complying with privacy regulations has taken on new importance with the
introduction of the EU's General Data Protection Regulation (GDPR) and other privacy …
introduction of the EU's General Data Protection Regulation (GDPR) and other privacy …
Modeling data flow constraints for design-time confidentiality analyses
With the increase in connectedness and the growing volume of data, ensuring confidentiality
becomes increasingly critical. Data-driven analyses try to cope with this complexity by …
becomes increasingly critical. Data-driven analyses try to cope with this complexity by …
Flaws in flows: Unveiling design flaws via information flow analysis
This paper presents a practical and formal approach to analyze security-centric information
flow policies at the level of the design model. Specifically, we focus on data confidentiality …
flow policies at the level of the design model. Specifically, we focus on data confidentiality …
[HTML][HTML] Real-world K-Anonymity applications: The KGen approach and its evaluation in fraudulent transactions
K-Anonymity is a property for the measurement, management, and governance of the data
anonymization. Many implementations of k-anonymity have been described in state of the …
anonymization. Many implementations of k-anonymity have been described in state of the …
Runtime and design time completeness checking of dangerous android app permissions against GDPR
R McConkey, O Olukoya - IEEE Access, 2023 - ieeexplore.ieee.org
Data and privacy laws, such as the GDPR, require mobile apps that collect and process the
personal data of their citizens to have a legally-compliant policy. Since these mobile apps …
personal data of their citizens to have a legally-compliant policy. Since these mobile apps …
How do we evaluate self-adaptive software systems?: A ten-year perspective of SEAMS
With the increase of research in self-adaptive systems, there is a need to better understand
the way research contributions are evaluated. Such insights will support researchers to …
the way research contributions are evaluated. Such insights will support researchers to …