Privacy and security by design: Comparing the EU and Israeli approaches to embedding privacy and security.
Eldar HaberAurelia Tamò-LarrieuxPublished in: Comput. Law Secur. Rev. (2020)
Keyphrases
- security issues
- security concerns
- statistical databases
- preserving privacy
- security mechanisms
- personal data
- information security
- sensitive data
- privacy preserving
- security and privacy issues
- security risks
- privacy issues
- security threats
- rfid systems
- protection mechanisms
- secure multiparty computation
- high assurance
- data security
- security services
- confidential information
- data privacy
- identity management
- security properties
- access control
- security requirements
- privacy requirements
- privacy concerns
- functional requirements
- security measures
- security policies
- privacy preservation
- individual privacy
- electronic payment
- privacy enhancing
- security management
- personal information
- biometric template
- rfid tags
- private information
- data integrity
- user privacy
- policy enforcement
- design process
- authentication protocol
- outsourced databases
- data mining
- access control models
- mutual authentication
- trusted third party
- key management
- security problems
- cyber security
- role based access control