| | |
---|
2020 | D2.1. Ethical, legal and societal aspects Knockaert, Manon; Gyseghem, Jean-Marc van; Friedewald, Michael; Lindner, Ralf | Report |
2020 | Fundamental rights, the normative keystone of DPIA Hallinan, Dara; Martin, Nicholas | Journal Article |
2020 | Privacy and identity management. Data for better living: AI and privacy : Friedewald, Michael (Ed.); Önen, Melek (Ed.); Lievens, Eva (Ed.); Krenn, Stephan (Ed.); Fricker, Samuel (Ed.) | Conference Proceedings |
2020 | Privacy as enabler of innovation Bachlechner, Daniel; Lieshout, Marc van; Timan, Tjerk | Conference Paper |
2019 | Assessing the legal and ethical impact of data reuse Custers, Bart; Vrabec, Helena U.; Friedewald, Michael | Journal Article |
2019 | Context-aware Security Jung, Christian : Rombach, Dieter; Pretschner, Alexander; Deßloch, S. | Dissertation |
2018 | Data protection impact assessment: A hands-on tour of the GDPR's most practical tool Bieker, Felix; Martin, Nicholas; Friedewald, Michael; Hansen, Marit | Conference Paper |
2018 | The emergence and analysis of European data protection regulation Karaboga, Murat | Book Article |
2018 | The EU general data protection regulation and its effects on designing assistive environments Krempel, Erik; Beyerer, Jürgen | Conference Paper |
2018 | Identity management and protection motivated by the general data protection regulation of the European Union - a conceptual framework based on state-of-the-art software technologies Birnstill, Pascal; Krempel, Erik; Wagner, P.G.; Beyerer, Jürgen | Journal Article |
2018 | Representing argumentation schemes with Constraint Handling Rules (CHR) Gordon, Thomas F.; Friedrich, Horst; Walton, Douglas | Journal Article |
2018 | The role of privacy-preserving technologies in the age of big data Bachlechner, Daniel; Fors, Karolina la; Sears, Alan M. | Conference Paper |
2017 | The cloud4health Project. Secondary use of clinical data with secure cloud-based text mining services Fluck, Juliane; Senger, Philipp; Ziegler, Wolfgang; Claus, Steffen; Schwichtenberg, Horst | Book Article |
2017 | Datenschutz-Folgenabschätzung Friedewald, Michael | Journal Article |
2016 | A privacy-friendly method to reward participants of online-surveys Herfert, Michael; Lange, Benjamin; Selzer, Annika; Waldmann, Ulrich | Conference Paper |
2016 | PrivacyInsight: The next generation privacy dashboard Bier, Christoph; Kühne, K.; Beyerer, Jürgen | Conference Paper |
2016 | A process for data protection impact assessment under the European general data protection regulation Bieker, Felix; Friedewald, Michael; Hansen, Marit; Obersteller, Hannah; Rost, Martin | Conference Paper |
2016 | Smart technologies - Workshop on challenges and trends for privacy in a hyper-connected world Baur-Ahrens, Andreas; Bieker, Felix; Friedewald, Michael; Geminn, Christian; Hansen, Marit; Karaboga, Murat; Obersteller, Hannah | Conference Paper |
2016 | Towards measuring the linkage risk in information flows Bier, Christoph; Beyerer, Jürgen | Conference Paper |
2016 | Working and living in interactive environments - requirements for security and privacy Krempel, Erik; Birnstill, Pascal; Beyerer, Jürgen | Conference Paper |
2015 | Open consent, biobanking and data protection law: Can open consent be "informed" under the forthcoming data protection regulation? Hallinan, Dara; Friedewald, Michael | Journal Article |
2014 | Automatic data protection certificates for cloud-services based on secure logging Kunz, Thomas; Selzer, Annika; Waldmann, Ulrich | Book Article |
2014 | Neurodata and neuroprivacy: Data protection outdated? Hallinan, Dara; Schütz, Philip; Friedewald, Michael; Hert, Paul de | Journal Article |
2014 | On the measurement of data protection compliance for cloud services Kunz, Thomas; Selzer, Annika; Waldmann, Ulrich | Conference Paper |
2014 | Open consent and informational obligations: Can biobanks still collect information prospectively under the data protection regulation? Hallinan, Dara; Friedewald, Michael | Conference Paper |
2014 | Privacy preserved duplicate check using multi-biometric fusion Butt, Moazzam; Damer, Naser; Rathgeb, Christian | Conference Paper |
2014 | Realisierung von vertrauenswürdigem Cloud-Computing mit SkIDentity Flach, Guntram; Kubach, Michael; Özmü, Eray; Wehrenberg, Immo | Conference Paper |
2013 | Experience made using public cloud infrastructure to analyse clinical patient data Ziegler, Wolfgang; Ihle, Matthias; Claus, Steffen; Senger, Philipp; Mohebbi, Pooya; Khan, Zakir; Fluck, Juliane; Griebel, Lena; Sedlmayr, Martin; Berger, Florian; Laufer, Julian; Chatziastros, Astros; Drepper, Johannes | Conference Paper |
2013 | Multi-Biometrische Gesichtserkennung Busch, Christoph; Brömme, Arslan; Pflug, Anika; Zhou, Xuebing; Dose, Michael; Brauckmann, Michael; Weber, Frank; Opel, Alexander; Neugebauer, Peter; Leowsky, Katja | Conference Paper |
2013 | Privacy preserving surveillance and the tracking-paradox Greiner, S.; Birnstill, Pascal; Krempel, Erik; Beckert, B.; Beyerer, Jürgen | Conference Paper |
2013 | Reconciling privacy and security Lieshout, Marc van; Friedewald, Michael; Wright, David; Gutwirth, Serge | Journal Article |
2012 | Accountability and independence of data protection authorities - a trade-off? Schütz, Philip | Book Article |
2012 | Citizens' perceptions of data protection and privacy in Europe Hallinan, Dara; Friedewald, Michael; McCarthy, Paul | Journal Article |
2012 | Comparing formal independence of data protection authorities in selected EU member states Schütz, Philip | Conference Paper |
2012 | Improved multilevel security with latent semantic indexing Thorleuchter, Dirk; Poel, Dirk van den | Journal Article |
2012 | Public perception of the data environment and information transactions Hallinan, Dara; Friedewald, Michael | Journal Article |
2012 | Schutz Geistigen Eigentums mit Enterprise Rights Management Henriques, Joselito R.; Lukas, Uwe von; Mesing, Benjamin | Journal Article |
2011 | Cui bono from giving up or protecting privacy? A basic decision theoretic model Schütz, P.; Friedewald, M. | Journal Article |
2011 | Legal restraints and security requirements on personal data and their technical implementation in clouds Barnitzke, Benno; Ziegler, Wolfgang; Vafiadis, George; Nair, Srijith; Kousiouris, George; Corrales, Marcelo; Wäldrich, Oliver; Forgó, Nikolaus; Varvarigou, Theodora | Conference Paper |
2011 | Ubiquitous computing: An overview of technology impacts Friedewald, M.; Raabe, O. | Journal Article |
2011 | Using service level agreements for optimising cloud infrastructure Djemame, K.; Lawrence, A.; Wäldrich, O.; Ziegler, W.; Zsigri, C. | Conference Paper |
2010 | Enterprise Rights Management - Eine neue Ära beim Schutz von Engineering-Know-How Mesing, Benjamin; Welsch, Jochen-Michael; Lukas, Uwe von | Journal Article |
2010 | Herausforderungen durch ubiquitäres Computing im Gesundheitsbereich Georgieff, P.; Friedewald, M. | Journal Article |
2010 | Privacy, data protection and emerging sciences and technologies: Towards a common framework Friedewald, M.; Wright, D.; Gutwirth, S.; Mordini, E. | Journal Article |
2010 | Protecting user privacy with multi-field anonymisation of ip addresses Schmoll, C.; Chatzis, N.; Henke, C. | Conference Paper |
2009 | Privacy, trust and policy-making: Challenges and responses Wright, D.; Gutwirth, S.; Friedewald, M.; Hert, P. de; Langheinrich, M.; Moscibroda, A. | Journal Article |
2009 | Vertrauliche Verarbeitung staatlich eingestufter Information - die Informationstechnologie im Geheimschutz Gericke, W.; Thorleuchter, D.; Weck, G.; Reiländer, F.; Loß, D. | Journal Article |
2007 | Protect intellectual property and prevent product counterfeiting - the IT perspective Lukas, Uwe von; Mesing, Benjamin; Vahl, Matthias | Conference Paper |
2005 | A hash-based scheme for the protection of users' information in biometric systems Han, Qui; Li, Qiong; Gonzalez, Yuridia; Niu, Xiamu | Journal Article |
2005 | Molehunt: Near-line semantic activity tracing Wolthusen, S. | Conference Paper |
2005 | Secure service provisioning framework (SSPF) for IP multimedia systems and next generation mobile networks Sher, Muhammad; Magedanz, Thomas | Conference Paper |
2003 | PKI-Unterstützung für mobile Endgeräte durch Server-Delegierung Ebinger, P.; Jalali-Sohi, M. | Conference Paper |
2003 | Web-Service- und eGovernment-Technologien im Rahmen des eFormsDirect-Frameworks Audersch, S. | Conference Paper |