Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
11 Ergebnisse
Sortierung:
In: Documentación administrativa
ISSN: 1989-8983
In: Estratégia: revista de estudos internacionais = Strategy = Strategie, Band 12-13, Heft 1, S. 43-68
In: Lecture Notes in Computer Science Ser. v.12703
Intro -- Preface -- Organization -- Contents -- I Implementing Personal Data Processing Principles -- The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy -- 1 Introduction -- 2 Limitations of Consent in the Digital Environment -- 3 Privacy by Design as a Stepping Stone for a Right to Customization? -- 3.1 Codifying Privacy by Design -- 3.2 Operationalizing Data Protection by Design and Default -- 3.3 Building Upon Data Protection by Design -- 4 Technology Solutions to Enhance Online Privacy -- 4.1 The Challenges of 'Engineering-Based Regulation' -- 4.2 New Hope for 'Regulation-Based Engineering' -- 5 Right to Customization -- 5.1 Inspired by the Right to Repair: Calling for a Right to Customization -- 5.2 Technological Approaches Enabling the Customization of Consent Variants -- 5.3 Restricting a Right to Customization to 'Reasonable Customizations' -- 6 Discussion and Conclusion -- References -- A Case Study on the Implementation of the Right of Access in Privacy Dashboards -- 1 Introduction -- 2 Related Work -- 2.1 Right of Access -- 2.2 Privacy Dashboards -- 3 Methodology -- 3.1 Selection of Online Services -- 3.2 Sign-Up and Use of Online Services -- 3.3 Examination of the Right of Access -- 4 Results -- 4.1 Information in Privacy Statements -- 4.2 Information in Privacy Dashboards and Exports -- 4.3 Summary of Findings -- 5 Discussion -- 5.1 Information About Purposes, Recipients, and Sources -- 5.2 Information About Categories of Data -- 5.3 Copy of Personal Data -- 6 Ethical Considerations -- 7 Limitations and Outlook -- 8 Conclusion -- References -- Consent Management Platforms Under the GDPR: Processors and/or Controllers? -- 1 Introduction -- 2 When are CMPs Processing Personal Data? -- 2.1 Legal Definitions -- 2.2 Mapping Legal Definitions into Practice -- 3 When are CMPs Data Processors?.
In: Journal of enterprise information management: an international journal, Band 35, Heft 6, S. 1477-1505
ISSN: 1758-7409
PurposeThe aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios.Design/methodology/approachThe paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whether blockchain should be used in all scenarios, according to the importance of each feature for different use cases.FindingsBased on analysis of existing systems, Sovrin is the IdM system that covers more features and is based on blockchain. For each of the evaluated use cases, Sovrin and UniquID were the chosen systems.Research limitations/implicationsThis paper opens new lines of research for IdM systems in IoT, including challenges related to device identity definition, privacy preserving and new security mechanisms.Originality/valueThis paper contributes to the ongoing research in IdM systems for IoT. The adequacy of blockchain is not only analyzed considering the technology; instead the authors analyze its application to real environments considering the required features for each use case.
Spontaneous and isolated dissection of external iliac artery is very rare. The natural course of this condition is not well established. The authors report a case of a 54 year old male, military, with ankylosing spondylitis presenting with limb claudication secondary to isolated dissection of external iliac artery. Dissection was successfully managed by percutaneous stent placement. ; A disseção espontânea e isolada da artéria ilíaca externa é rara. A evolução clínica desta patologia é variável. Os autores apresentam o caso de um militar, 54 anos, com espondilite anquilosante que apresenta claudicação do membro inferior secundária a disseção isolada da artéria ilíaca externa. A disseção foi tratada através de angioplastia com colocação de stent.
BASE
In: Security and Cryptology 12121
In: Springer eBook Collection
In: BMC Public Health, Band 19, S. 1-8
Background: Completing mortality data by information on possible socioeconomic inequalities in mortality is crucial for policy planning. The aim of this study was to build deprivation-specific life tables using the Portuguese version of the European Deprivation Index (EDI) as a measure of area-level socioeconomic deprivation, and to evaluate mortality trends between the periods 2000–2002 and 2010–2012. Methods: Statistics Portugal provided the counts of deaths and population by sex, age group, calendar year and area of residence (parish). A socioeconomic deprivation level was assigned to each parish according to the quintile of their national EDI distribution. Death counts were modelled within the generalised linear model framework as a function of age, deprivation level and calendar period. Mortality Rate Ratios (MRR) were estimated to evaluate variations in mortality between deprivation groups and periods. Results: Life expectancy at birth increased from 74.0 and 80.9 years in 2000–2002, for men and women, respectively, and to 77.6 and 83.8 years in 2010–2012. Yet, life expectancy at birth differed by deprivation, with, compared to least deprived population, a deficit of about 2 (men) and 1 (women) years among most deprived in the whole study period. The higher mortality experienced by most deprived groups at birth (in 2010–2012, mortality rate ratios of 1.74 and 1.29 in men and women, respectively) progressively disappeared with increasing age. Conclusions: Persistent differences in mortality and life expectancy were observed according to ecological socioeconomic deprivation. These differences were larger among men and mostly marked at birth for both sexes.
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. RBAC is a rigid model where access control decisions have only two output options: Grant or Deny. Break The Glass (BTG) policies on the other hand are flexible and allow users to break or override the access controls in a controlled and justifiable manner. The main objective of this paper is to integrate BTG within the NEST/ANSI RBAC model in a transparent and secure way so that it can be adopted generically in any domain where unanticipated or emergency situations may occur. The new proposed model, called BTG-RBAC, provides a third decision option BTG, which grants authorized users permission to break the glass rather than be denied access. This can easily be implemented in any application without major changes to either the application code or the RBAC authorization infrastructure, apart from the decision engine. Finally, in order to validate the model, we discuss how the BTG-RBAC model is being introduced within a Portuguese healthcare institution where the legislation requires that genetic information must be accessed by a restricted group of healthcare professionals. These professionals, advised by the ethical committee, have required and asked for the implementation of the BTG concept in order to comply with the said legislation.
BASE
In: Health and human development