[PDF][PDF] Privacy with secondary use of personal information

S Wohlgemuth, K Takaragi… - MKWI Research-in …, 2016 - researchgate.net
Secondary use of personal information is of essential importance for the Internet of Things.
The main application is resilience. Biometrics is an example for support of resilience in times …

Delegation for Privacy Management from Womb to Tomb–A European Perspective

M Hansen, M Raguse, K Storf… - IFIP PrimeLife International …, 2009 - Springer
In our information society with processing of personal data in almost all areas of life, the
legally granted right to privacy is quite hard to preserve. User-controlled identity …

IT Security measures and their relation to data protection

C Sorge - Law and Technology in a Global Digital Society …, 2022 - Springer
Data protection, which aims at protecting the right of individuals to informational self-
determination, requires appropriate IT security measures. However, the relation between …

Marrying transparency tools with user-controlled identity management

M Hansen - IFIP International Summer School on the Future of …, 2007 - Springer
User-controlled identity management systems assist individuals in managing their private
sphere. An individual's privacy can be supported by transparency on processing of personal …

Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection

H Benfenatki, F Biennier - Research and Practical Issues of Enterprise …, 2018 - Springer
Nowadays European context is introducing a new directive for data protection, which
imposes new constraints to business owners which manipulate personal data. Among …

Resilience by Usable Security.

S Wohlgemuth - MuC (Workshopband), 2015 - degruyter.com
Resilience is introduced as the new security goal supported with security/safety-related
information by data-centric services for predictive risk management in real-time. The …

[PDF][PDF] Modeling and deployment of data protection as component of information security systems

I Gaidarski, P Kutinchev, Z Minchev - … Conference On Information …, 2017 - researchgate.net
In this paper, we present the data protection as one of the major components of every
Information Security System (ISS). For this purpose, we outline the component-based …

[PDF][PDF] The Right of Access as a tool for Privacy Governance

H Asghari, RLP Mahieu, P Mittal… - Proceedings of Hot …, 2017 - pure.tudelft.nl
Personal data is a key asset in the data economy. Ubiquitous internet connectivity,
increased computing power, and cheaper storage have resulted in the exponential use of …

Privacy enforcement with data owner-defined policies

T Scheffler - 2013 - publishup.uni-potsdam.de
This thesis proposes a privacy protection framework for the controlled distribution and use of
personal private data. The framework is based on the idea that privacy policies can be set …

Building an eco-system of trusted services via user control and transparency on personal data

M Vescovi, C Moiso, M Pasolli, L Cordin… - Trust Management IX: 9th …, 2015 - Springer
The amount of personal information that is generated and collected on a daily basis is
rapidly growing due to the increasing number of activities performed online and, in …