Search results

98 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study image/x-coreldrawpattern Survey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
The study, using a survey, attempts to evaluate which are currently the mechanisms deployed in available online services for accountability, consent, trust, security and privacy. While the finding of this survey cannot be easily extrapolated to all online services, some trends are prominent and it is safe to assume that these are valid for most organisations that operate online. Besides these trends, we mention here the lack of a single coherent view on how to best achieve user privacy in online environments. An increase in awareness of privacy and security concepts within organisations and industry sectors appears to be desirable, in order to maintain a high level of security and confidence on the part of users and society in the ICT infrastructure and services provided within the EU. A major area of concern was how the EU would create and maintain a ‘level regulatory playing field’, especially with non-EU based multinationals entering the EU market without proper (privacy) compliance and rapidly establishing a significant user base.
Located in Publications
Report/Study The right to be forgotten - between expectations and practice
The right to be forgotten is included in the proposed regulation on data protection published by the European Commission in January 2012. The regulation is still to be adopted by the European Parliament for entering into force. The different legal aspects of the right to be forgotten (i.e. right to erasure or right to oblivion) have been debated in different contexts and are beyond the scope of this paper. With this paper we aim to cover other facets of the right to be forgotten. We focus on the technical means to enforce or support the right in information systems; as can be seen from this paper, there are technical limitations and there is a further need for clear definitions and legal clarifications.
Located in Publications
Report/Study Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology
Located in Publications
Report/Study Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex I
This is Annex I - " Scenario Building & Analysis" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".
Located in Publications
Report/Study Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex II
This is Annex II - "Risk Assessment Spreadsheet" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".
Located in Publications
Report/Study To log or not to log? - Risks and benefits of emerging life-logging applications
Located in Publications
EQR Issue EQR Q3 2007, vol. 3, no. 3
Trusted Computing
Located in Publications / ENISA Quarterly Review - Archive / Past Issues
EQR Issue EQR Q3 2008, vol. 4, no. 3
Security and Interoperability of eID
Located in Publications / ENISA Quarterly Review - Archive / Past Issues
Report/Study ECMAScript program Security guidelines on the appropriate use of qualified electronic registered delivery services
This document addresses qualified electronic registered delivery services and is one out of a series of five documents which aim to assist parties wishing to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible applications. This series of documents also aims to give those parties some advice on how to correctly use the related qualified trust services.
Located in Publications
Report/Study ECMAScript program Security guidelines on the appropriate use of qualified website authentication certificates
This document addresses qualified certificates for website authentication and is one out of a series of five documents which aim to assist parties wishing to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information