Searched for: subject%3A%22Privacy%255C%2Bby%255C%2BDesign%22
(1 - 8 of 8)
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
van Haaften, W. (author), Sangers, A. (author), Engers, T. (author), Djafari, s. (author)
Analysing combined data sets can result in signifi cant added value for many organisations, but the GDPR has put strict constraints on processing personal data. Anonymization by using Multi-Party Computation (MPC) however may off er organizations some relief of the perceived burden of GDPR under specifi c conditions. In this paper, we will...
conference paper 2020
document
Riva, G.M. (author), Vasenev, A. (author), Zannone, N. (author)
The processing of personal data is becoming a key business factor, especially for high-tech system industries such as automotive and healthcare service providers. To protect such data, the European Union (EU) has introduced the General Data Protection Regulation (GDPR), with the aim to standardize and strengthen data protection policies across...
conference paper 2020
document
Liu, L.C. (author), Sileno, G. (author), van Engers, T. (author)
The combination of smart contracts with blockchain technology enables the authentication of the contract and limits the risks of non-compliance. In principle, smart contracts can be processed more efficiently compared to traditional paper-based contracts. However, current smart contracts have very limited capabilities with respect to normative...
conference paper 2020
document
van Binsbergen, L.T. (author), Liu, L.C. (author), van Doesburg, R. (author), van Engers, T. (author)
conference paper 2020
document
Koldijk, S.J. (author), Koot, G. (author), Neerincx, M.A. (author), Kraaij, W. (author)
Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at work. We address privacy from two perspectives: 1...
bookPart 2014
document
Koops, B.J. (author), Hoepman, J.H. (author), Leenes, R. (author)
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience...
article 2013
document
van Lieshout, M.J. (author), Kool, L. (author), van Schoonhoven, B. (author), de Jonge, M. (author)
Purpose: The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework. Design/methodology/approach: Attention for alternative concepts, such as PbD, which might offer surplus value in safeguarding privacy, is growing. Using PbD to design for privacy in ICT systems is still...
article 2011
Searched for: subject%3A%22Privacy%255C%2Bby%255C%2BDesign%22
(1 - 8 of 8)