Part 3: Selected PapersInternational audienceTo implement the principle of Privacy by Design mentioned in the European General Data Protection Regulation one important measurement stated there is pseudonymisation. Pseudonymous data is widely used in medical applications and is investigated e.g. for vehicular ad-hoc networks and Smart Grid. The concepts used there address a broad range of important aspects and are therefore often specific and complex. Some privacy patterns are already addressing pseudonymity, but they are mostly abstract or rather very specific. This paper proposes privacy patterns for the development of pseudonymity concepts based on the analysis of pseudonymity solutions in use cases
Privacy includes the right of individuals and organizations to determine for themselves when, how an...
In an era of big data, online services are becoming increasingly data-centric; they collect, process...
We present a flexibly configurable toolkit for the automatic pseudonymization of datasets that keeps...
The ISO TC215 WG4 pseudonymisation task group has produced in 2008 a first version of a technical sp...
The ISO TC215 WG4 pseudonymisation task group has produced in 2008 a first version of a technical sp...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...
Abstract—Pseudonymisation as a data privacy concept for medical data is not new. The process of pseu...
Due to sensitivity nature of the data in e-healthcare and the need of these data to different ¿healt...
Abstract—Privacy is one of the fundamental issues in health care today and a fundamental right of ev...
© The Authors, published by EDP Sciences, 2020. The topic of pseudonymization of personal data has s...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Art. 4(5) introduces the concept of “pseudonymisation”, which consists in processing personal data i...
People, devices, and networks are generating data incessantly. The rapid growth in personal informat...
The proliferation of digital technologies in healthcare creates two conflicting needs: protection of...
Privacy includes the right of individuals and organizations to determine for themselves when, how an...
In an era of big data, online services are becoming increasingly data-centric; they collect, process...
We present a flexibly configurable toolkit for the automatic pseudonymization of datasets that keeps...
The ISO TC215 WG4 pseudonymisation task group has produced in 2008 a first version of a technical sp...
The ISO TC215 WG4 pseudonymisation task group has produced in 2008 a first version of a technical sp...
Pseudonymisation is a data protection technique often used to protect the privacy of individuals whe...
Abstract—Pseudonymisation as a data privacy concept for medical data is not new. The process of pseu...
Due to sensitivity nature of the data in e-healthcare and the need of these data to different ¿healt...
Abstract—Privacy is one of the fundamental issues in health care today and a fundamental right of ev...
© The Authors, published by EDP Sciences, 2020. The topic of pseudonymization of personal data has s...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
Art. 4(5) introduces the concept of “pseudonymisation”, which consists in processing personal data i...
People, devices, and networks are generating data incessantly. The rapid growth in personal informat...
The proliferation of digital technologies in healthcare creates two conflicting needs: protection of...
Privacy includes the right of individuals and organizations to determine for themselves when, how an...
In an era of big data, online services are becoming increasingly data-centric; they collect, process...
We present a flexibly configurable toolkit for the automatic pseudonymization of datasets that keeps...