Interagency data exchange protocols as computational data protection law
نویسندگان
چکیده
The paper describes a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design”, through a formal representation of legal rules in a firewall type system. .
منابع مشابه
Privacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کاملA hybrid computational intelligence model for foreign exchange rate forecasting
Computational intelligence approaches have gradually established themselves as a popular tool for forecasting the complicated financial markets. Forecasting accuracy is one of the most important features of forecasting models; hence, never has research directed at improving upon the effectiveness of time series models stopped. Nowadays, despite the numerous time series forecasting models propos...
متن کاملAdvances in the Development and Validation of Test Methods in the United States
The National Toxicology Program Interagency Center for the Evaluation of Alternative Toxicological Methods (NICEATM) provides validation support for US Federal agencies and the US Tox21 interagency consortium, an interagency collaboration that is using high throughput screening (HTS) and other advanced approaches to better understand and predict chemical hazards to humans and the environment. T...
متن کاملEfficient key exchange protocols for wireless networks and mobile devices
In this paper, we design efficient authenticated key exchange protocols that take the special constraints of wireless networks and mobile devices, such as limitations in bandwidth, computational power, memory space and battery lifetime, into account. To accomplish the design goals, we show how a Diffie-Hellman (DH) key exchange can be securely integrated into a digital signature scheme (DSS) us...
متن کاملDesign of IPsec and IKE version 1 and 2 ∗
IPsec is a collection of protocols that provides network layer data integrity and confidentiality services. IKEv1 is a versatile key agreement protocol that allows perfect forward secrecy and identity protection (among other things). IKEv2 has similar functionalities as IKEv1, but provides a simpler and better approach to key exchange. Additionally, IKEv2 provides new methods for authentication...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010