Otwarty dostęp

Practical Methods of Implementation for the Indispensable Mechanism of GDPR Compliance

Abrahams Nick, Griffin Jamie ‘Privacy law: The end of a long road: Mandatory data breach notification becomes law’ (2017) 32 Law Society of NSW Journal. NickAbrahams JamieGriffin ‘Privacy law: The end of a long road: Mandatory data breach notification becomes law’ 2017 32 Law Society of NSW Journal Search in Google Scholar

Alhazmi Omar H., Malaiya Yashwant K., ‘Assessing disaster recovery alternatives: On-site, colocation or cloud’. Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on. IEEE. Alhazmi OmarH. Malaiya YashwantK. ‘Assessing disaster recovery alternatives: On-site, colocation or cloud’ Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on. IEEE 10.1109/ISSREW.2012.20 Search in Google Scholar

Chakraborty Nilotpal, ‘Intrusion detection system and intrusion prevention system: A comparative study’ (2013) International Journal of Computing and Business Research. NilotpalChakraborty ‘Intrusion detection system and intrusion prevention system: A comparative study’ 2013 International Journal of Computing and Business Research Search in Google Scholar

Drozd, Olha, ‘Privacy pattern catalogue: A tool for integrating privacy principles of ISO/IEC 29100 into the software development process’ IFIP International Summer School on Privacy and Identity Management (Springer, Cham 2015). DrozdOlha ‘Privacy pattern catalogue: A tool for integrating privacy principles of ISO/IEC 29100 into the software development process’ IFIP International Summer School on Privacy and Identity Management Springer Cham 2015 10.1007/978-3-319-41763-9_9 Search in Google Scholar

Fortiş, Teodor-Florin, Ion Munteanu Victor, ‘Topics in cloud incident management’ (2017). FortişTeodor-Florin VictorIon Munteanu ‘Topics in cloud incident management’ 2017 10.1016/j.future.2016.11.003 Search in Google Scholar

Humphreys Edward, Implementing the ISO/IEC 27001: 2013 ISMS Standard (Artech House 2016). EdwardHumphreys Implementing the ISO/IEC 27001: 2013 ISMS Standard Artech House 2016 Search in Google Scholar

Jun, Ma, et al., ‘The application of Chinese wall policy in data leakage prevention’. Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE. JunMa ‘The application of Chinese wall policy in data leakage prevention’ Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE 10.1109/CSNT.2012.111 Search in Google Scholar

Maldoff Gabriel, ‘The risk-based approach in the GDPR: interpretation and implications’ IAPP https://iapp.org/media/pdf/resource_center/GDPR_Study_Maldoff.pdf. GabrielMaldoff ‘The risk-based approach in the GDPR: interpretation and implications’ IAPP https://iapp.org/media/pdf/resource_center/GDPR_Study_Maldoff.pdf. Search in Google Scholar

Malviya Rupali, Umrao Brajesh K, ‘Machine Learning Security’ (2014). RupaliMalviya Umrao BrajeshK ‘Machine Learning Security’ 2014 Search in Google Scholar

Purohit, Bijayalaxmi, Pawan Prakash Singh, ‘Data leakage analysis on cloud computing’ (2013) 3.3. International Journal of Engineering Research and Applications. PurohitBijayalaxmi SinghPawan Prakash ‘Data leakage analysis on cloud computing’ 2013 3 3 International Journal of Engineering Research and Applications Search in Google Scholar

Routray Ramani Ranjan et al., ‘Method and system for automated integrated server-network-storage disaster recovery planning’ U.S. Patent No. 8,121,966. 21 Feb. 2012. RanjanRoutray Ramani ‘Method and system for automated integrated server-network-storage disaster recovery planning’ U.S. Patent No. 8,121,966. 21 Feb. 2012 Search in Google Scholar

Setiawan, Alexander, Wibowo Adi, Hartanto Susilo Andrew, ‘Risk Analysis on the development of a Business Continuity Plan’ Computer Applications and Information Processing Technology (CAIPT), 2017 4th International Conference on. IEEE. SetiawanAlexander AdiWibowo AndrewHartanto Susilo ‘Risk Analysis on the development of a Business Continuity Plan’ Computer Applications and Information Processing Technology (CAIPT), 2017 4th International Conference on. IEEE 10.1109/CAIPT.2017.8320736 Search in Google Scholar

Sloan, Robert H., Warner Richard ‘How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have’ (2017). SloanRobert H. RichardWarner ‘How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have’ 2017 10.2139/ssrn.3032143 Search in Google Scholar

Sobel, William E., McCorkendale Bruce, ‘Restoration of backed up data by restoring incremental backup (s) in reverse chronological order’ U.S. Patent No. 7,802,134. 21 Sep. 2010. SobelWilliam E. BruceMcCorkendale ‘Restoration of backed up data by restoring incremental backup (s) in reverse chronological order’ U.S. Patent No. 7,802,134. 21 Sep. 2010 Search in Google Scholar

Verheul Eric, Jacobs Bart, ‘Polymorphic encryption and pseudonymisation in identity management and medical research’ (2017). EricVerheul BartJacobs ‘Polymorphic encryption and pseudonymisation in identity management and medical research’ 2017 Search in Google Scholar

Yod-Samuel Martin, Kung Antonio, ‘Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering’ 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). MartinYod-Samuel AntonioKung ‘Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering’ 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 10.1109/EuroSPW.2018.00021 Search in Google Scholar

eISSN:
2084-1264
Język:
Angielski
Częstotliwość wydawania:
2 razy w roku
Dziedziny czasopisma:
Law, Public Law, other