Interagency data exchange protocols as computational data protection law

نویسندگان

  • William J. Buchanan
  • Lu Fan
  • Alistair Lawson
  • Burkhard Schafer
  • Russel Scott
  • Christoph Thuemmler
  • Omair Uthmani
چکیده

The paper describes a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design”, through a formal representation of legal rules in a firewall type system. .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy in Cyberspace

Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...

متن کامل

A hybrid computational intelligence model for foreign exchange rate forecasting

Computational intelligence approaches have gradually established themselves as a popular tool for forecasting the complicated financial markets. Forecasting accuracy is one of the most important features of forecasting models; hence, never has research directed at improving upon the effectiveness of time series models stopped. Nowadays, despite the numerous time series forecasting models propos...

متن کامل

Advances in the Development and Validation of Test Methods in the United States

The National Toxicology Program Interagency Center for the Evaluation of Alternative Toxicological Methods (NICEATM) provides validation support for US Federal agencies and the US Tox21 interagency consortium, an interagency collaboration that is using high throughput screening (HTS) and other advanced approaches to better understand and predict chemical hazards to humans and the environment. T...

متن کامل

Efficient key exchange protocols for wireless networks and mobile devices

In this paper, we design efficient authenticated key exchange protocols that take the special constraints of wireless networks and mobile devices, such as limitations in bandwidth, computational power, memory space and battery lifetime, into account. To accomplish the design goals, we show how a Diffie-Hellman (DH) key exchange can be securely integrated into a digital signature scheme (DSS) us...

متن کامل

Design of IPsec and IKE version 1 and 2 ∗

IPsec is a collection of protocols that provides network layer data integrity and confidentiality services. IKEv1 is a versatile key agreement protocol that allows perfect forward secrecy and identity protection (among other things). IKEv2 has similar functionalities as IKEv1, but provides a simpler and better approach to key exchange. Additionally, IKEv2 provides new methods for authentication...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010