UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 9,967
1.
  • Federated Machine Learning,... Federated Machine Learning, Privacy-Enhancing Technologies, and Data Protection Laws in Medical Research: Scoping Review
    Brauneck, Alissa; Schmalhorst, Louisa; Kazemi Majdabadi, Mohammad Mahdi ... JMIR. Journal of medical internet research/Journal of medical internet research, 03/2023, Volume: 25, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The collection, storage, and analysis of large data sets are relevant in many sectors. Especially in the medical field, the processing of patient data promises great progress in personalized health ...
Full text
2.
Full text

PDF
3.
  • Modern Socio-Technical Pers... Modern Socio-Technical Perspectives on Privacy
    Knijnenburg, Bart P; Page, Xinru; Wisniewski, Pamela ... 2022, 2022-02-09
    eBook
    Open access

    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to ...
Full text
4.
  • Perspectives on Digital Hum... Perspectives on Digital Humanism
    Werthner, Hannes; Prem, Erich; Lee, Edward A ... 2022, 2021, 2021-11-23
    eBook
    Open access

    This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including ...
Full text
5.
  • Privacy preservation in fed... Privacy preservation in federated learning: An insightful survey from the GDPR perspective
    Truong, Nguyen; Sun, Kai; Wang, Siyao ... Computers & security, November 2021, 2021-11-00, 20211101, Volume: 110
    Journal Article
    Peer reviewed
    Open access

    •Provide a novel systematic analysis on privacy preservation in Federated Learning (FL) taking into account the system architecture, threat models, different types of attack as well as the existing ...
Full text

PDF
6.
  • Data Protection by Design T... Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent
    Chhetri, Tek Raj; Kurteva, Anelia; DeLong, Rance J ... Sensors, 04/2022, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection. Organizations face significant challenges, such as demonstrating compliance (or auditability) and automated ...
Full text
7.
  • Obstructions in Security-Aw... Obstructions in Security-Aware Business Processes
    Holderer, Julius 2022, 2022-07-23
    eBook
    Open access

    This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The ...
Full text
8.
  • The European Union general ... The European Union general data protection regulation: what it is and what it means
    Hoofnagle, Chris Jay; van der Sloot, Bart; Borgesius, Frederik Zuiderveen Information & communications technology law, 01/2019, Volume: 28, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This paper introduces the strategic approach to regulating personal data and the normative foundations of the European Union's General Data Protection Regulation ('GDPR'). We explain the genesis of ...
Full text

PDF
9.
  • Privacy Engineering for Dom... Privacy Engineering for Domestic IoT: Enabling Due Diligence
    Lodge, Tom; Crabtree, Andy Sensors, 10/2019, Volume: 19, Issue: 20
    Journal Article
    Peer reviewed
    Open access

    The EU’s General Data Protection Regulation (GDPR) has recently come into effect and insofar as Internet of Things (IoT) applications touch EU citizens or their data, developers are obliged to ...
Full text

PDF
10.
  • Enhancing Data Protection i... Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs
    Khalid, Muhammad Irfan; Ahmed, Mansoor; Kim, Jungsuk Sensors, 09/2023, Volume: 23, Issue: 17
    Journal Article
    Peer reviewed
    Open access

    Dynamic consent management allows a data subject to dynamically govern her consent to access her data. Clearly, security and privacy guarantees are vital for the adoption of dynamic consent ...
Full text
1 2 3 4 5
hits: 9,967

Load filters