Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen… - arxiv preprint arxiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Blockchain enabled privacy audit logs
Privacy audit logs are used to capture the actions of participants in a data sharing
environment in order for auditors to check compliance with privacy policies. However …
environment in order for auditors to check compliance with privacy policies. However …
Planar catadioptric stereo: Geometry and calibration
J Gluckman, SK Nayar - Proceedings. 1999 IEEE Computer …, 1999 - ieeexplore.ieee.org
By using mirror reflections of a scene, stereo images can be captured with a single camera
(catadioptric stereo). Single camera stereo provides both geometric and radiometric …
(catadioptric stereo). Single camera stereo provides both geometric and radiometric …
Black block recorder: Immutable black box logging for robots via blockchain
Event data recording is crucial in robotics research, providing prolonged insights into a
robot's situational understanding, progression of behavioral state, and resulting outcomes …
robot's situational understanding, progression of behavioral state, and resulting outcomes …
A-PPL: an accountability policy language
Cloud Computing raises various security and privacy challenges due to the customers'
inherent lack of control over their outsourced data. One approach to encourage customers to …
inherent lack of control over their outsourced data. One approach to encourage customers to …
Security towards the edge: Sticky policy enforcement for networked smart objects
One of the hottest topics in the Internet of Things (IoT) domain relates to the ability of
enabling computation and storage at the edges of the network. This is becoming a key …
enabling computation and storage at the edges of the network. This is becoming a key …
Designing a digital environment to support the co-production of public services: Balancing multiple requirements and governance concepts
This paper investigates the challenges of designing a computer supported collaborative
environment aimed at facilitating co-production processes, ie, those collaborative processes …
environment aimed at facilitating co-production processes, ie, those collaborative processes …
Sticky policies: A survey
In the digital age, where the Internet connects things across the globe and individuals are
constantly online, data security and privacy are becoming key drivers (and barriers) of …
constantly online, data security and privacy are becoming key drivers (and barriers) of …
Strong accountability: beyond vague promises
D Butin, M Chicote, D Le Métayer - Reloading Data Protection …, 2013 - Springer
The principle of accountability has been enjoying growing popularity over the last few years
as a way to mitigate the loss of control by individuals over their personal data. It is however …
as a way to mitigate the loss of control by individuals over their personal data. It is however …
Whom to trust? Using technology to enforce privacy
D Le Métayer - Enforcing Privacy: Regulatory, Legal and …, 2016 - Springer
A wide variety of technologies and tools have been proposed to improve privacy protection.
We first review these technologies according to two criteria: the functionality they provide …
We first review these technologies according to two criteria: the functionality they provide …