[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rhahla et al., 2021 - Google Patents

Guidelines for GDPR compliance in Big Data systems

Rhahla et al., 2021

Document ID
15148704608802097223
Author
Rhahla M
Allegue S
Abdellatif T
Publication year
Publication venue
Journal of Information Security and Applications

External Links

Snippet

The implementation of the GDPR that aims at protecting European citizens' privacy is still a real challenge. In particular, in Big Data systems where data are voluminous and heterogeneous, it is hard to track data evolution through its complex life cycle ranging from …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Rhahla et al. Guidelines for GDPR compliance in Big Data systems
US11405428B2 (en) Method and system for policy management, testing, simulation, decentralization and analysis
Antwi et al. The case of HyperLedger Fabric as a blockchain solution for healthcare applications
JP7064576B2 (en) Systems and methods for implementing centralized privacy control in decentralized systems
Ahmadi et al. Capabilities and advantages of cloud computing in the implementation of electronic health record
CN105659238B (en) Data driven mode for patient data exchange system
Akhter Md Hasib et al. [Retracted] Electronic Health Record Monitoring System and Data Security Using Blockchain Technology
Shahriar et al. A survey of privacy risks and mitigation strategies in the Artificial Intelligence life cycle
Yarmand et al. Behavior-based access control for distributed healthcare systems
Iwaya et al. Mobile health systems for community-based primary care: Identifying controls and mitigating privacy threats
Abbate et al. Blockchain technology for embracing healthcare 4.0
Conley et al. GDPR compliance challenges for interoperable health information exchanges (HIEs) and trustworthy research environments (TREs)
Rhahla et al. A framework for GDPR compliance in big data systems
Tazi et al. Sok: Evaluating privacy and security vulnerabilities of patients’ data in healthcare
Varshney et al. Big data analytics and data mining for healthcare informatics (HCI)
Kumar et al. A lightweight blockchain-based framework for medical cyber-physical system
Wang et al. Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks
Natsiavas et al. Developing an infrastructure for secure patient summary exchange in the EU context: lessons learned from the KONFIDO project
AbdelSalam Blockchain revolutionizing healthcare industry: A systematic review of blockchain technology benefits and threats
Al Amin et al. Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach.
Padget et al. Fine-grained access control via policy-carrying data
Gottardelli et al. GEN-RWD Sandbox: bridging the gap between hospital data privacy and external research insights with distributed analytics
Rajab et al. A Review of IoMT Security and Privacy related Frameworks
Matullo et al. Use of blockchain technology for implantable medical device tracking
Chia Analysing the Design of Privacy-Preserving Data-Sharing Architecture