Rhahla et al., 2021 - Google Patents
Guidelines for GDPR compliance in Big Data systemsRhahla et al., 2021
- Document ID
- 15148704608802097223
- Author
- Rhahla M
- Allegue S
- Abdellatif T
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
The implementation of the GDPR that aims at protecting European citizens' privacy is still a real challenge. In particular, in Big Data systems where data are voluminous and heterogeneous, it is hard to track data evolution through its complex life cycle ranging from …
- 238000003860 storage 0 abstract description 64
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rhahla et al. | Guidelines for GDPR compliance in Big Data systems | |
US11405428B2 (en) | Method and system for policy management, testing, simulation, decentralization and analysis | |
Antwi et al. | The case of HyperLedger Fabric as a blockchain solution for healthcare applications | |
JP7064576B2 (en) | Systems and methods for implementing centralized privacy control in decentralized systems | |
Ahmadi et al. | Capabilities and advantages of cloud computing in the implementation of electronic health record | |
CN105659238B (en) | Data driven mode for patient data exchange system | |
Akhter Md Hasib et al. | [Retracted] Electronic Health Record Monitoring System and Data Security Using Blockchain Technology | |
Shahriar et al. | A survey of privacy risks and mitigation strategies in the Artificial Intelligence life cycle | |
Yarmand et al. | Behavior-based access control for distributed healthcare systems | |
Iwaya et al. | Mobile health systems for community-based primary care: Identifying controls and mitigating privacy threats | |
Abbate et al. | Blockchain technology for embracing healthcare 4.0 | |
Conley et al. | GDPR compliance challenges for interoperable health information exchanges (HIEs) and trustworthy research environments (TREs) | |
Rhahla et al. | A framework for GDPR compliance in big data systems | |
Tazi et al. | Sok: Evaluating privacy and security vulnerabilities of patients’ data in healthcare | |
Varshney et al. | Big data analytics and data mining for healthcare informatics (HCI) | |
Kumar et al. | A lightweight blockchain-based framework for medical cyber-physical system | |
Wang et al. | Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks | |
Natsiavas et al. | Developing an infrastructure for secure patient summary exchange in the EU context: lessons learned from the KONFIDO project | |
AbdelSalam | Blockchain revolutionizing healthcare industry: A systematic review of blockchain technology benefits and threats | |
Al Amin et al. | Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach. | |
Padget et al. | Fine-grained access control via policy-carrying data | |
Gottardelli et al. | GEN-RWD Sandbox: bridging the gap between hospital data privacy and external research insights with distributed analytics | |
Rajab et al. | A Review of IoMT Security and Privacy related Frameworks | |
Matullo et al. | Use of blockchain technology for implantable medical device tracking | |
Chia | Analysing the Design of Privacy-Preserving Data-Sharing Architecture |