The Security Implications of Data Subject Rights
暂无分享,去创建一个
[1] T. Holt,et al. A Crime Script Analysis of the Online Stolen Data Market , 2015 .
[2] Jef Ausloos,et al. Shattering One-Way Mirrors. Data Subject Access Rights in Practice , 2018 .
[3] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[4] Christopher Millard,et al. Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States , 2016, Comput. Law Secur. Rev..
[5] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[6] Tristan Henderson,et al. How Portable is Portable?: Exercising the GDPR's Right to Data Portability , 2018, UbiComp/ISWC Adjunct.
[7] Michael Veale,et al. When data protection by design and data subject rights clash , 2018 .
[8] Norberto Nuno Gomes de Andrade. Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights , 2010, PrimeLife.
[9] Billy Rios,et al. Hacking: The Next Generation , 2009 .
[10] Jennifer Cobbe,et al. RECLAIMING Data: Overcoming App Identification Barriers for Exercising Data Protection Rights , 2018, UbiComp/ISWC Adjunct.