Scientific projects

SCIENTIFIC

RESEARCH

Core Projects

Deep Packet Inspection

 

The subject mater of the thesis has been adjusted; it now focuses on the private-public exchange of personal data, notably when data have been mined in the private sphere in another jurisdicton (more precisely the US).

 

 

 

 

The right to be forgotten

 

The memory of the Web: a taxonomy of the social problems The inducement of Paulan Korenhof her research is the development of the so-called “Right to be Forgotten and Erasure” as part of the General Data Protection Regulation.

 

 

 

Privacy in the Internet of Things

 

The subject mater of the thesis has been adjusted; it now focuses on the private-public exchange of personal data, notably when data have been mined in the private sphere in another jurisdicton (more precisely the US).

 

 

International Projects

USEMP

 

A large majority of Europeans engage with Online Social Networks (OSNs) and a recent Eurobarometer study concludes that 74% of respondents think that they do not have enough control of the data they share and 70% are concerned with the way

such data are handled by OSNs.

 

PRISMS

 

The PRISMS project will analyse the traditional trade-off model between privacy and security and devise a more evidence-based perspective for reconciling privacy and security, trust and concern. It will examine how technologies aimed at enhancing security are subjecting citizens to an increasing amount of surveillance

and, in many cases, causing infringements of privacy and fundamental rights.

 

FutureID

 

The FutureID project builds a

comprehensive, flexible, privacy-aware and ubiquitously usable identity management infrastructure for Europe.  It integrates existing eID technology, trust infrastructures, emerging federated identity management services, and modern credential technologies. 

 

C-DAX

 

he progressive penetration of conventional and renewable distributed generation is driving major changes in power systems infrastructure, justifying the introduction of more intelligence, in particular in power distribution networks. The information infrastructure will play a central role as future power systems cannot be supported by centralized information infrastructures on which today’s power systems rely.

 

 

National Projects

IRMA: I Reveal My Attributes

 

Digital attributes are properties that some authority states about you. It can be your age, your bank account number, or your right for some discount at a shop. What is new about these attributes is that you can carry these data items on one smart card conveniently and still disclose them independently.

 

 

 

Revocable Privacy

 

A large majority of Europeans engage with Online Social Networks (OSNs) and a recent Eurobarometer study concludes that 74% of respondents think that they do not have enough control of the data they share and 70% are concerned with the way

such data are handled by OSNs.

 

 

 

Identity Management on Mobile Devices

 

Mobile devices such as GSM phones, PDA’s, RFID, offer a technological platform which can help solving the problems of ID management for the roaming user, as they can be employed as trusted control interface for applications using personal and privacy sensitive information. However, the implementation of identity management concepts

on mobile devices with their typical restrictions and features is still

a challenge..

 

 

 

Online transactie-autenticatie

 

Hoe kan een gebruiker online veilig transacties uitvoeren, gezien de beperkingen van de beschikbare apparatuur zowel qua functionaliteit als beveiliging?  Transactie-authenticatie is te vergelijken met een online equivalent van een handtekening zetten. Het gaat verder dan authenticatie van de gebruiker: het gaat om de authenticatie van wilsuitingen van deze gebruiker.

 

 

 

Smart Grid

 

A large majority of Europeans engage with Online Social Networks (OSNs) and a recent Eurobarometer study concludes that 74% of respondents think that they do not have enough control of the data they share and 70% are concerned with the way

such data are handled by OSNs.

 

 

 

Public-private actions against botnets: establishing the legal boundaries

 

Back to the typewriters? – Rethinking informational self-determination in the era of mass state surveillance

 

Privacy and big data-based security in public spaces

 

P4P: Patterns 4 Privacy

 

OYOI: Own Your Own Identity

 

PEP: Polymorphic encryption and pseudonymisation for personalised healthcare

 

No place in Legal Protection. Finding a new paradigm to protect citizens in the age of ubiquitous data