PoSeID-on will develop and deliver an innovative intrinsically scalable platform, as an integrated and comprehensive solution aimed to safeguard the rights of data subjects , exploiting the cutting-edge technologies of Smart Contracts and Blockchain, as well as support organizations in data management and processing while ensuring GDPR compliance. For more information: https://www.poseidon-h2020.eu/
The valuable insights that can be inferred from data analytics generated and collected from a variety of devices and applications are transforming businesses and are therefore one of the key motivations for organisations to adopt such technologies. Nevertheless, the data being analysed and processed are highly sensitive and put the individuals’ privacy at risk. Nowadays, the current European General Data Protection Regulation (GDPR) represents a […]
PDP4E aims to widespread the creation of products, systems and services that better protect the privacy and personal data of EU citizens. By endowing software and systems engineers with methods and software tools on data protection principles applications. The overall project objective is to widespread the creation of products, systems and services that better protect the privacy and personal data of EU citizens. For more […]
Assisting Micro Enterprises to adopt and be compliant with GDPR SMOOTH project assists Micro enterprises to adopt and be compliant with the General Data Protection Regulation (GDPR) by designing and implementing easy-to-use and affordable tools to generate awareness on their GDPR obligations and analysing their level of compliance with the new data protection regulation. For more information: https://smoothplatform.eu/
DEFeND is an international partnership that will deliver a platform to empower organisations in different sectors to assess and comply to the The European Union’s General Data Protection Regulation (GDPR), increasing their maturity in different aspects of GDPR. DEFeND is an Innovation Action (IA) project, and as such its main focus will be on improving existing software tools and frameworks and developing new ‘integration software’, […]
The FP7 DEMONS project dealt with cooperative network monitoring, in order to provide scalable and privacy-preserving security of networks and infrastructures. In that respect, it developed a variety of technologies, ranging from network monitoring hardware to cryptographic mechanisms and process management systems. Expertise brought by common partners will certainly benefit BPR4GDPR, especially since the major achievements of DEMONS include PETs and an innovative semantic approach […]
PaaSword introduces a holistic data privacy and security by design framework enhanced by sophisticated context-aware policy access models and robust policy access, decision, enforcement and governance mechanisms. It enables the implementation of secure and transparent cloud-based applications and services that can maintain a fully distributed and totally encrypted data persistence layer, and, thus, will ensure data protection, integrity and confidentiality, even in the case where […]
ACSI’s objective was to dramatically reduce the effort and lead-time of designing, deploying, maintaining, and joining into environments that support service collaborations. BPR4GDPR will take into consideration the work of ACSI and further elaborate on this, especially regarding its achievements in the fields of flexible and scalable support for service collaborations, modelling and deployment of business processes, verification and synthesis techniques and process mining.
PriCE aims to develop the foundations of a novel approach that empowers users to control their data and enables organisations to comply with user policies as well as with legal requirements. Among the developments of the project, the system for security and privacy policies specification and the learning mechanism for policy refinement are of particular interest for BPR4GDPR.
ReCRED’s objective is to design and implement an integrated next generation access control solution that (i) relieves users from the burden of managing directly multiple passwords, pins and accounts; (iii) offers a unifying access control framework applicable to a number of situations, both online and offline; (iii) is aligned with current technological trends and capabilities; and, most importantly, (iv) correctly address the legal scenario on […]