Guidelines for GDPR compliance in Big Data systems

M Rhahla, S Allegue, T Abdellatif - Journal of Information Security and …, 2021 - Elsevier
The implementation of the GDPR that aims at protecting European citizens' privacy is still a
real challenge. In particular, in Big Data systems where data are voluminous and …

Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective

N Azam, L Michala, S Ansari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …

[HTML][HTML] Addressing the clinical unmet needs in primary Sjögren's Syndrome through the sharing, harmonization and federated analysis of 21 European cohorts

VC Pezoulas, A Goules, F Kalatzis, L Chatzis… - Computational and …, 2022 - Elsevier
For many decades, the clinical unmet needs of primary Sjögren's Syndrome (pSS) have
been left unresolved due to the rareness of the disease and the complexity of the underlying …

Towards a Holistic Privacy Requirements Engineering Process: Insights from a Systematic Literature Review

GB Herwanto, FJ Ekaputra, G Quirchmayr… - IEEE Access, 2024 - ieeexplore.ieee.org
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to
integrate privacy principles into organizational and technical processes throughout the …

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform

A Tsohou, E Magkos, H Mouratidis… - … & Computer Security, 2020 - emerald.com
Purpose General data protection regulation (GDPR) entered into force in May 2018 for
enhancing personal data protection. Even though GDPR leads toward many advantages for …

A taxonomy for mining and classifying privacy requirements in issue reports

P Sangaroonsilp, HK Dam, M Choetkiertikul… - Information and …, 2023 - Elsevier
Context: Digital and physical trails of user activities are collected over the use of software
applications and systems. As software becomes ubiquitous, protecting user privacy has …

DEFeND DSM: A data scope management service for model-based privacy by design GDPR compliance

L Piras, MG Al-Obeidallah, M Pavlidis… - Trust, Privacy and …, 2020 - Springer
The introduction of the European General Data Protection Regulation (GDPR) has brought
significant benefits to citizens, but it has also created challenges for organisations, which are …

Alternative methodology and framework for assessing differential privacy constraints and consequences from a gdpr perspective

D Prokhorenkov - 2022 IEEE 12th Annual Computing and …, 2022 - ieeexplore.ieee.org
Nowadays, manipulation with personal data is constant and used in many industries, and
while processing such data, questions arise related to the need to minimize or eliminate the …

Evolutionary Consideration on User Authentication: Security, Privacy, and Safety

C Vorakulpipat, E Rattanalerdnusorn - IT Professional, 2021 - ieeexplore.ieee.org
User authentication needs not only to negotiate with security, privacy, and legal issues
through functionality and usability, but also to address safety issues caused by sudden and …

Private data sharing in a secure cloud-based application for acute stroke care

LHA Reis, MT De Oliveira, DMF Mattos… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
Acute stroke care demands fast procedures and collaboration of different healthcare
organisations and professionals. The development of cloud computing and the wide …