Have a personal or library account? Click to login
Practical Methods of Implementation for the Indispensable Mechanism of GDPR Compliance Cover

Practical Methods of Implementation for the Indispensable Mechanism of GDPR Compliance

Open Access
|Apr 2022

References

  1. Abrahams Nick, Griffin Jamie ‘Privacy law: The end of a long road: Mandatory data breach notification becomes law’ (2017) 32 Law Society of NSW Journal.
  2. Alhazmi Omar H., Malaiya Yashwant K., ‘Assessing disaster recovery alternatives: On-site, colocation or cloud’. Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on. IEEE.
  3. Chakraborty Nilotpal, ‘Intrusion detection system and intrusion prevention system: A comparative study’ (2013) International Journal of Computing and Business Research.
  4. Drozd, Olha, ‘Privacy pattern catalogue: A tool for integrating privacy principles of ISO/IEC 29100 into the software development process’ IFIP International Summer School on Privacy and Identity Management (Springer, Cham 2015).
  5. Fortiş, Teodor-Florin, Ion Munteanu Victor, ‘Topics in cloud incident management’ (2017).
  6. Humphreys Edward, Implementing the ISO/IEC 27001: 2013 ISMS Standard (Artech House 2016).
  7. Jun, Ma, et al., ‘The application of Chinese wall policy in data leakage prevention’. Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE.
  8. Maldoff Gabriel, ‘The risk-based approach in the GDPR: interpretation and implications’ IAPP https://iapp.org/media/pdf/resource_center/GDPR_Study_Maldoff.pdf.
  9. Malviya Rupali, Umrao Brajesh K, ‘Machine Learning Security’ (2014).
  10. Purohit, Bijayalaxmi, Pawan Prakash Singh, ‘Data leakage analysis on cloud computing’ (2013) 3.3. International Journal of Engineering Research and Applications.
  11. Routray Ramani Ranjan et al., ‘Method and system for automated integrated server-network-storage disaster recovery planning’ U.S. Patent No. 8,121,966. 21 Feb. 2012.
  12. Setiawan, Alexander, Wibowo Adi, Hartanto Susilo Andrew, ‘Risk Analysis on the development of a Business Continuity Plan’ Computer Applications and Information Processing Technology (CAIPT), 2017 4th International Conference on. IEEE.
  13. Sloan, Robert H., Warner Richard ‘How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have’ (2017).
  14. Sobel, William E., McCorkendale Bruce, ‘Restoration of backed up data by restoring incremental backup (s) in reverse chronological order’ U.S. Patent No. 7,802,134. 21 Sep. 2010.
  15. Verheul Eric, Jacobs Bart, ‘Polymorphic encryption and pseudonymisation in identity management and medical research’ (2017).
  16. Yod-Samuel Martin, Kung Antonio, ‘Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering’ 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Language: English
Page range: 31 - 47
Published on: Apr 16, 2022
Published by: University of Wroclaw, Faculty of Law, Administration and Economics
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year
Related subjects:

© 2022 Michał Bańka, Tomasz Soczyński, Dariusz Wasiak, published by University of Wroclaw, Faculty of Law, Administration and Economics
This work is licensed under the Creative Commons Attribution 4.0 License.