Core Projects
The subject mater of the thesis has been adjusted; it now focuses on the private-public exchange of personal data, notably when data have been mined in the private sphere in another jurisdicton (more precisely the US).
The memory of the Web: a taxonomy of the social problems The inducement of Paulan Korenhof her research is the development of the so-called “Right to be Forgotten and Erasure” as part of the General Data Protection Regulation.
Privacy in the Internet of Things
The subject mater of the thesis has been adjusted; it now focuses on the private-public exchange of personal data, notably when data have been mined in the private sphere in another jurisdicton (more precisely the US).
International Projects
A large majority of Europeans engage with Online Social Networks (OSNs) and a recent Eurobarometer study concludes that 74% of respondents think that they do not have enough control of the data they share and 70% are concerned with the way
such data are handled by OSNs.
The PRISMS project will analyse the traditional trade-off model between privacy and security and devise a more evidence-based perspective for reconciling privacy and security, trust and concern. It will examine how technologies aimed at enhancing security are subjecting citizens to an increasing amount of surveillance
and, in many cases, causing infringements of privacy and fundamental rights.
The FutureID project builds a
comprehensive, flexible, privacy-aware and ubiquitously usable identity management infrastructure for Europe. It integrates existing eID technology, trust infrastructures, emerging federated identity management services, and modern credential technologies.
he progressive penetration of conventional and renewable distributed generation is driving major changes in power systems infrastructure, justifying the introduction of more intelligence, in particular in power distribution networks. The information infrastructure will play a central role as future power systems cannot be supported by centralized information infrastructures on which today’s power systems rely.
National Projects
Digital attributes are properties that some authority states about you. It can be your age, your bank account number, or your right for some discount at a shop. What is new about these attributes is that you can carry these data items on one smart card conveniently and still disclose them independently.
A large majority of Europeans engage with Online Social Networks (OSNs) and a recent Eurobarometer study concludes that 74% of respondents think that they do not have enough control of the data they share and 70% are concerned with the way
such data are handled by OSNs.
Identity Management on Mobile Devices
Mobile devices such as GSM phones, PDA’s, RFID, offer a technological platform which can help solving the problems of ID management for the roaming user, as they can be employed as trusted control interface for applications using personal and privacy sensitive information. However, the implementation of identity management concepts
on mobile devices with their typical restrictions and features is still
a challenge..
Online transactie-autenticatie
Hoe kan een gebruiker online veilig transacties uitvoeren, gezien de beperkingen van de beschikbare apparatuur zowel qua functionaliteit als beveiliging? Transactie-authenticatie is te vergelijken met een online equivalent van een handtekening zetten. Het gaat verder dan authenticatie van de gebruiker: het gaat om de authenticatie van wilsuitingen van deze gebruiker.
A large majority of Europeans engage with Online Social Networks (OSNs) and a recent Eurobarometer study concludes that 74% of respondents think that they do not have enough control of the data they share and 70% are concerned with the way
such data are handled by OSNs.
Public-private actions against botnets: establishing the legal boundaries
Back to the typewriters? – Rethinking informational self-determination in the era of mass state surveillance
Privacy and big data-based security in public spaces
P4P: Patterns 4 Privacy
OYOI: Own Your Own Identity
PEP: Polymorphic encryption and pseudonymisation for personalised healthcare
No place in Legal Protection. Finding a new paradigm to protect citizens in the age of ubiquitous data