On purpose and by necessity: compliance under the GDPR

D Basin, S Debois, T Hildebrandt - … , Curaçao, February 26–March 2, 2018 …, 2018 - Springer
Abstract The European General Data Protection Regulation (GDPR) gives primacy to
purpose: Data may be collected and stored only when (i) end-users have consented, often …

Planar catadioptric stereo: Geometry and calibration

J Gluckman, SK Nayar - Proceedings. 1999 IEEE Computer …, 1999 - ieeexplore.ieee.org
By using mirror reflections of a scene, stereo images can be captured with a single camera
(catadioptric stereo). Single camera stereo provides both geometric and radiometric …

Realizing purpose-based privacy policies succinctly via information-flow labels

NVN Kumar, RK Shyamasundar - 2014 IEEE Fourth …, 2014 - ieeexplore.ieee.org
Privacy policies are often defined in terms of purposes for which the information may be
used. Recent work on specification and enforcement of purpose-based privacy policies …

Privacy by design: a formal framework for the analysis of architectural choices

D Le Métayer - Proceedings of the third ACM conference on Data and …, 2013 - dl.acm.org
The privacy by design approach has already been applied in different areas. We believe that
the next challenge in this area today is to go beyond individual cases and to provide …

Privacy by Design: From Technologies to Architectures: (Position Paper)

T Antignac, D Le Métayer - Annual privacy forum, 2014 - Springer
Existing work on privacy by design mostly focus on technologies rather than methodologies
and on components rather than architectures. In this paper, we advocate the idea that …

Efficient enforcement of action-aware purpose-based access control within relational database management systems

P Colombo, E Ferrari - IEEE Transactions on Knowledge and …, 2015 - ieeexplore.ieee.org
Among the variety of access control models proposed for database management systems
(DBMSs) a key role is covered by the purpose-based access control model, which, while …

Formal verification of privacy properties in electric vehicle charging

M Fazouane, H Kopp, RW van der Heijden… - … Secure Software and …, 2015 - Springer
Electric vehicles are an up-and-coming technology that provides significant environmental
benefits. A major challenge of these vehicles is their somewhat limited range, requiring the …

The Evolving Path of “the Right to Be Left Alone”-When Privacy Meets Technology

M Iezzi - 2021 Third IEEE International Conference on Trust …, 2021 - ieeexplore.ieee.org
This paper deals with the hot, evergreen topic of the relationship between privacy and
technology. We give extensive motivation for why the privacy debate is still alive for private …

Contextual privacy policy modeling in iot

E Onu, MM Kwakye, K Barker - … , Intl Conf on Cloud and Big …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has been one of the biggest revelations of the last decade.
These cyber-physical systems seamlessly integrate and improve the activities in our daily …

Quantifying privacy violations

M Banerjee, R Karimi Adl, L Wu, K Barker - Secure Data Management: 8th …, 2011 - Springer
Understanding privacy in a data storage environment has become of increasing interest to
the data management and user communities over the past decade. Previous work has …