- Access Control and Trust
- Business Process Modeling and Analysis
- Privacy-Preserving Technologies in Data
- Service-Oriented Architecture and Web Services
- Distributed and Parallel Computing Systems
- Information and Cyber Security
- Advanced Database Systems and Queries
- Software System Performance and Reliability
- Internet Traffic Analysis and Secure E-voting
- Software Engineering Techniques and Practices
- Corporate Governance and Management
- Model-Driven Software Engineering Techniques
- Parallel Computing and Optimization Techniques
- Advanced Data Storage Technologies
- Semantic Web and Ontologies
- Privacy, Security, and Data Protection
- Network Security and Intrusion Detection
- Flexible and Reconfigurable Manufacturing Systems
Commissariat à l'Énergie Atomique et aux Énergies Alternatives
2024
University of Freiburg
2008-2009
University of Fribourg
2007
Various approaches to automate the observance of compliance requirements have recently been proposed. Since there is no all-round solution available within foreseeable future, we propose a classification scheme for existing that address different aspects automating compliance. A layer model used linking laws and regulations with company's IT system. The "policy layer" seen as link between non-technical their implementation in achievable degree automation essen-tially depends on...
Today, personalized services are lucrative for service providers and their customers. With increasing pervasiveness interconnection, however, customers show concerns about privacy. If were to refuse the processing of personal data in general, economic potential could not be realized. We claim that such scepticism is a direct consequence incomplete control mechanisms. To line with laws help users usage data, we propose Extended Privacy Definition Tool (ExPDT) only provides as well formal...