Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Berthold, Stefan"'
Autor:
Berthold, Stefan
Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied, distributed, and long-term stored at negligible costs. This has dramatic conseque
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-33972
Autor:
Berthold, Stefan
Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied and distributed at negligible costs. This has dramatic consequences for individual
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-7319
Autor:
Berthold, Stefan
A person who is communication about (the data subject) has to keep track of all of his revealed data in order to protect his right of informational self-determination. This is important when data is going to be processed in an automatic manner and, i
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-369
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:759-778
Autor:
Angulo, Julio, Berthold, Stefan, Elkhiyaoui, Kaoutar, Fernandez Gago, M. Carmen, Fischer-Hübner, Simone, David, Nunez, Pulls, Tobias, Reuben, Jenni, Van Rompay, Cédric, Santana de Oliveira, Anderson, Önen, Melek
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::22069b2065f913e08c518fb42b0719c6
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-38919
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-38919
Publikováno v:
In Computer and Information Security Handbook Edition: Second Edition. 2013:755-772
Autor:
Berthold, Stefan
The data protection laws in Europe require that data controllers provide privacy policies to inform individuals about the prospective processing of their personal data. The ever growing expressiveness of privacy policy languages allows to specify pol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::7a848c108a12872ed5757c423cef027d
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27396
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27396
The goal of this work is to reason on the complexity of the relationship between three non-functional requirements in cloud comput-ing; privacy, accountability, and transparency. We provide insights on the complexity of this relationship from the per
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::443c189f98d3fb9854c46c23f76ff4e1
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27844
http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27844
Autor:
Amoroso, Edward G., Bardin, Jeffrey S., Basile, Cataldo, Berthold, Stefan, Beuchelt, Gerald, Bhaskar, Rahul, Braghin, Chiara, Caballero, Albert, Casalino, Matteo Maria, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Cremonini, Marco, Curry, Samuel J.J., Dara, Rozita, Day, Christopher, di Vimercati, Sabrina De Capitani, El Maliki, Tewfiq, Ellis, Scott R., Erbschloe, Michael, Fischer-Hbner, Simone, Foresti, Sara, Fulp, Errin W., Genovese, Angelo, Granova, Anna, Gross, William F., Guan, Yong, Gurkok, Cem, Hao, Feng, Hamed, Tarfa, Harmening, James T., Hoffman, Rich, Huseynov, Emin, Jakobsson, Markus, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Korba, Larry, Kotapati, Kameswari, Kremer, Stefan C., LaPorta, Thomas F., Lencrenon, Jean, Lewis, Keith, Liu, Peng, Livraga, Giovanni, Mallery, John R., Mansoor, Bill, Martin, Luther, McDonald, John, McGowan, John, Mims, Nailah, Mutti, Simone, Nicoletti, Peter F., Noble, Kevin, Pandya, Pramod, Patil, Harsh Kupwade, Paraboschi, Stefano, Peacock, Thea, Perkins, Ken, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Santambrogio, Marco, Santana, Mario, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Slaviero, Marco, Soper, Daniel S., Spies, Terence, Stallings, William, Tsow, Alex, Walker, Jesse, West, Michael A., Wing, Dan, Yee, George O.M., Yan, Liang, Zabicki, Roman, Zhao, Gansen, Zias, Zhe
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:xxvii-xxx
Autor:
Berthold, Stefan
Publikováno v:
Privacy & Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers; 2011, p27-40, 14p