[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Access control for IoT: A survey of existing research, dynamic policies and future directions

K Ragothaman, Y Wang, B Rimal, M Lawrence - Sensors, 2023 - mdpi.com
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …

Cyber-physical systems: imminent challenges

M Broy, MV Cengarle, E Geisberger - Monterey workshop, 2012 - Springer
A German project is presented which was initiated in order to analyse the potential and risks
associated with Cyber-Physical Systems. These have been recognised as the next wave of …

Privacy, security and trust issues arising from cloud computing

S Pearson, A Benameur - 2010 IEEE Second International …, 2010 - ieeexplore.ieee.org
Cloud computing is an emerging paradigm for large scale infrastructures. It has the
advantage of reducing cost by sharing computing and storage resources, combined with an …

[PDF][PDF] Networks of control

W Christl, S Spiekermann - A report on corporate surveillance, digital …, 2016 - academia.edu
In his book “How Our Days Became Numbered” historian Dan Bouk looks into how life
insurers started to predict people's lives and their relative risk of death at the end of the …

Cloud computing security issues and challenges

K Popović, Ž Hocenski - The 33rd international convention …, 2010 - ieeexplore.ieee.org
In the last few years, cloud computing has grown from being a promising business concept
to one of the fastest growing segments of the IT industry. Now, recession-hit companies are …

Taking account of privacy when designing cloud computing services

S Pearson - 2009 ICSE Workshop on Software Engineering …, 2009 - ieeexplore.ieee.org
Privacy is an important issue for cloud computing, both in terms of legal compliance and
user trust, and needs to be considered at every phase of design. In this paper the privacy …

[BUCH][B] Ethical IT innovation: A value-based system design approach

S Spiekermann - 2015 - books.google.com
Explaining how ubiquitous computing is rapidly changing our private and professional lives,
Ethical IT Innovation stands at the intersection of computer science, philosophy, and …

Privacy in internet of things: From principles to technologies

C Li, B Palanisamy - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …

A privacy manager for cloud computing

S Pearson, Y Shen, M Mowbray - … 2009, Bei**g, China, December 1-4 …, 2009 - Springer
We describe a privacy manager for cloud computing, which reduces the risk to the cloud
computing user of their private data being stolen or misused, and also assists the cloud …