359 results on '"Le Métayer, Daniel"'
Search Results
2. Towards a Framework for Challenging ML-Based Decisions
3. A Multi-layered Approach for Tailored Black-Box Explanations
4. Position Paper: Analyzing the Impacts of Facial Recognition
5. A framework to contest and justify algorithmic decisions
6. Analysis of Privacy Policies to Enhance Informed Consent
7. A Multi-layered Approach for Tailored Black-Box Explanations
8. Risk Sources
9. Stakeholders
10. Privacy Risk Analysis
11. Privacy Harms
12. Terminology
13. Feared Events
14. Personal Data
15. Processing System
16. Formal Accountability for Biometric Surveillance: A Case Study
17. Position Paper: Analyzing the Impacts of Facial Recognition
18. A Refinement Approach for the Reuse of Privacy Risk Analysis Results
19. Conclusion
20. Whom to Trust? Using Technology to Enforce Privacy
21. Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems
22. PRIAM: A Privacy Risk Analysis Methodology
23. Analysis of Privacy Policies to Enhance Informed Consent
24. Trust Driven Strategies for Privacy by Design
25. Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage
26. Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures
27. Formal Verification of Privacy Properties in Electric Vehicle Charging
28. PRIPARE: A New Vision on Engineering Privacy and Security by Design
29. Privacy Architectures: Reasoning about Data Minimisation and Integrity
30. A General Trace-Based Framework of Logical Causality
31. Privacy by Design: From Technologies to Architectures : (Position Paper)
32. Log Analysis for Data Protection Accountability
33. Strong Accountability: Beyond Vague Promises
34. Body-worn cameras for police accountability: Opportunities and risks
35. A general framework for blaming in component-based systems
36. Introduction
37. From the Protection of Data to the Protection of Individuals: Extending the Application of Non-discrimination Principles
38. Delegation of Obligations and Responsibility
39. Formal Methods as a Link between Software Code and Legal Rules
40. A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence
41. Causality Analysis in Contract Violation
42. Privacy by Design: A Matter of Choice
43. A Formal Privacy Management Framework
44. A Refinement Approach for the Reuse of Privacy Risk Analysis Results
45. IT Security Analysis Best Practices and Formal Approaches
46. Introduction to Gamma
47. Gamma and the Chemical Reaction Model: Fifteen Years After
48. Formal Methods in Practice: The Missing Links. A Perspective from the Security Area
49. MAPPING THE USE OF FACIAL RECOGNITION IN PUBLIC SPACES IN EUROPE A QUEST FOR CLARITY: UNPICKING THE 'CATCH-ALL' TERM
50. Verification by Testing for Recursive Program Schemes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.