z-logo
open-access-imgOpen Access
Security Analysis of Subject Access Request Procedures How to authenticate data subjects safely when they request for their data
Author(s) -
Coline Boniface,
Imane Fouad,
Nataliia Bielova,
Cédric Lauradoux,
Cristiana Santos
Publication year - 2019
Publication title -
hal (le centre pour la communication scientifique directe)
Language(s) - English
Resource type - Conference proceedings
Subject(s) - subject (documents) , computer science , authentication (law) , computer security , data protection act 1998 , data breach , access control , internet privacy , identity (music) , data access , subject access , general data protection regulation , world wide web , database , physics , acoustics

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here