Privacy Shielding by Design — A Strategies Case for Near-Compliance
暂无分享,去创建一个
[1] A. Cavoukian. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .
[2] C. Bier,et al. Common privacy patterns in video surveillance and smart energy , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[3] OPINION OF ADVOCATE GENERAL BOT , 2013 .
[4] J. Olsen,et al. The European Commission , 2020, The European Union.
[5] Agustí Verde Parera,et al. General data protection regulation , 2018 .
[6] Jaap-Henk Hoepman,et al. A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[7] Fabio Massacci,et al. How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach , 2007, ICAIL.
[8] Munawar Hafiz,et al. A pattern language for developing privacy enhancing technologies , 2013, Softw. Pract. Exp..
[9] Harun Baraki,et al. Towards Interdisciplinary Design Patterns for Ubiquitous Computing Applications Technical Report , 2014 .
[10] D. C. Dashfield. HER MAJESTY'S STATIONERY OFFICE , 1954 .
[11] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .