On purpose and by necessity: compliance under the GDPR

D Basin, S Debois, T Hildebrandt - … , Curaçao, February 26–March 2, 2018 …, 2018 - Springer
Abstract The European General Data Protection Regulation (GDPR) gives primacy to
purpose: Data may be collected and stored only when (i) end-users have consented, often …

[HTML][HTML] Patient consent management by a purpose-based consent model for electronic health record based on blockchain technology

D Tith, JS Lee, H Suzuki… - Healthcare …, 2020 - synapse.koreamed.org
Objectives Currently, patients' consent is essential to use their medical records for various
purposes; however, most people give their consent using paper forms and have no control …

GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute

R Nowrozy, K Ahmed, H Wang - PloS one, 2025 - journals.plos.org
As digital healthcare evolves, the security of electronic health records (EHR) becomes
increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating …

Monitoring the GDPR

E Arfelt, D Basin, S Debois - … : 24th European Symposium on Research in …, 2019 - Springer
Abstract The General Data Protection Regulation (GDPR) has substantially strengthened the
requirements for data processing systems, requiring audits at scale. We show how and to …

Intelligent performance-aware adaptation of control policies for optimizing banking teller process using machine learning

B Tay, A Mourad - IEEE Access, 2020 - ieeexplore.ieee.org
In the current banking systems and business processes, the permission granted to
employees is controlled and managed by the configured access control methods, in which …

Insider Threat Detection: A Review

P Manoharan, J Yin, H Wang… - … on Networking and …, 2024 - ieeexplore.ieee.org
In the cyber world, insider threats significantly challenge organizational security. These
threats originate from malicious or negligent employees with authorized access, making …

Building access control policy model for privacy preserving and testing policy conflicting problems

H Wang, J Cao, Y Zhang, H Wang, J Cao… - … Control Management in …, 2020 - Springer
This chapter proposes a purpose-based access control model in distributed computing
environment for privacy preserving policies and mechanisms, and describes algorithms for …

Elastic optimization for stragglers in edge federated learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …

Using JSON to specify privacy preserving-enabled attribute-based access control policies

QNT Thi, TK Dang, HL Van, HX Son - Security, Privacy, and Anonymity in …, 2017 - Springer
With the growth of big data systems and ubiquitous computing, privacy has become a critical
issue in security research. Purpose based access control model is a common approach for …

[PDF][PDF] Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution

HX Son, E Chen - … Journal of Advanced Computer Science and …, 2019 - researchgate.net
Access control is a security technique that specifies access rights to resources in a
computing environment. As information systems nowadays become more complex, it plays …