This document is one of the deliverables of the ACCEPT project, under WP2 – Foundations, and in particular, task T2.4-Security Access Control (SEAC) framework design & guidelines for technical solution developers. The purpose of this deliverable is to give a detailed description of the final cybersecurity framework as it has been designed in agreement with the system architecture. A lot of attention has been given to the protection of the personal data of the users throughout the whole platform. All mechanisms and principles followed are designed with respect to General Data Protection Regulation. All data that are being processed inside the ACCEPT platform have been anonymized, while security mechanisms have been implemented in all compone...
Executive summary Modern technology, which is a result of design, can collect a lot of personal info...
This deliverable entitled “MATRYCS Technical and Security Specification” reports the preliminary eff...
Successful protection of company data assets requires strong technological support. As many security...
This deliverable discusses the security mechanisms that are going to be implemented to the ACCEPT so...
ACCEPT extends to multiple different geographical and social contexts around Europe, including 4 cou...
This deliverable focuses on legal requirements related to the treatment and sharing of data. It buil...
The increase in demand for the transport of people and goods is leading to a rapid development of tr...
Privacy and data protection is major challenge that needs to be addressed by EU funded projects give...
This report is Deliverable 3 (D3) “PRiAM Privacy Risk Framework Application Guide” of the DARE UK PR...
The webinos project aims to deliver a cross-device web application runtime environment, providing a ...
We report on work in capturing cybersecurity requirements for cloud-based and IoT-enabled multi-side...
Each member of the information society generates, often quite involuntarily, noticeable amounts of d...
H2020 SPIRIT. Scalable privacy preserving intelligence analysis for resolving identities. Deliverabl...
Art. 25 introduces two general data protection requirements: data protection by design (Art. 25 para...
Maritime surveillance is essential for creating maritime awareness. When open source intelligence (O...
Executive summary Modern technology, which is a result of design, can collect a lot of personal info...
This deliverable entitled “MATRYCS Technical and Security Specification” reports the preliminary eff...
Successful protection of company data assets requires strong technological support. As many security...
This deliverable discusses the security mechanisms that are going to be implemented to the ACCEPT so...
ACCEPT extends to multiple different geographical and social contexts around Europe, including 4 cou...
This deliverable focuses on legal requirements related to the treatment and sharing of data. It buil...
The increase in demand for the transport of people and goods is leading to a rapid development of tr...
Privacy and data protection is major challenge that needs to be addressed by EU funded projects give...
This report is Deliverable 3 (D3) “PRiAM Privacy Risk Framework Application Guide” of the DARE UK PR...
The webinos project aims to deliver a cross-device web application runtime environment, providing a ...
We report on work in capturing cybersecurity requirements for cloud-based and IoT-enabled multi-side...
Each member of the information society generates, often quite involuntarily, noticeable amounts of d...
H2020 SPIRIT. Scalable privacy preserving intelligence analysis for resolving identities. Deliverabl...
Art. 25 introduces two general data protection requirements: data protection by design (Art. 25 para...
Maritime surveillance is essential for creating maritime awareness. When open source intelligence (O...
Executive summary Modern technology, which is a result of design, can collect a lot of personal info...
This deliverable entitled “MATRYCS Technical and Security Specification” reports the preliminary eff...
Successful protection of company data assets requires strong technological support. As many security...