Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Protection and Data Security Issues Related to Cloud Computing in the EU.. ISSE, page 163-172. Vieweg+Teubner, (2010)CCTV and Workplace Privacy - Italy.. ISSE, page 333-345. Vieweg+Teubner, (2004)Digital Rights Management in the Cloud., and . Cloud Computing and Digital Media, Chapman and Hall/CRC, (2014)Rethinking the one-stop-shop mechanism: Legal certainty and legitimate expectation., , and . Comput. Law Secur. Rev., 30 (4): 392-402 (2014)Designing Connected and Automated Vehicles around Legal and Ethical Concerns: Data Protection as a Corporate Social Responsibility., , , and . SETN Workshops, volume 2844 of CEUR Workshop Proceedings, page 139-151. CEUR-WS.org, (2020)Data Protection and Data Security by Design Applied to Financial Intelligence., , and . ISSE, page 73-85. Springer, (2013)Personal Data Protection Aspects of Big Data.. Big Data - Algorithms, Analytics, and Applications, Chapman and Hall/CRC, (2015)Privacy by design and anonymisation techniques in action: Case study of Ma3tch technology., and . Comput. Law Secur. Rev., 29 (4): 330-340 (2013)Data Protection by Design in Smart Data Environments 1.. Smart Data, Chapman and Hall/CRC, (2019)An ATM switching testbed., , , , , and . Eur. Trans. Telecommun., 2 (4): 391-401 (1991)