![]() Bartolini, Cesare ![]() ![]() ![]() in IEEE Security and Privacy (2019), 17(6), 37-45 Understanding whether certain technical measures comply with the General Data Protection Regulation’s (GDPR’s) principles is complex legal work. This article describes a model of the GDPR that allows for ... [more ▼] Understanding whether certain technical measures comply with the General Data Protection Regulation’s (GDPR’s) principles is complex legal work. This article describes a model of the GDPR that allows for semiautomatic processing of legal text and the leveraging of state-of-the-art legal informatics approaches, which are useful for legal reasoning, software design, information retrieval, or compliance checking. [less ▲] Detailed reference viewed: 237 (19 UL)![]() Ryan, Peter ![]() in IEEE Security and Privacy (2015), 13(3), 59-62 End-to-end verifiability represents a paradigm shift in electronic voting, providing a way to verify the integrity of the election by allowing voters to audit the information published by the system ... [more ▼] End-to-end verifiability represents a paradigm shift in electronic voting, providing a way to verify the integrity of the election by allowing voters to audit the information published by the system, rather than trusting that the system has behaved correctly. Recent deployments of these systems in real elections demonstrate their practical applicability. [less ▲] Detailed reference viewed: 276 (13 UL) |
||