40 likes | 269 Views
Privacy Protection Techniques & Security. B. Claerhout. Scope of the Topic. Technical solutions for implementing necessary security & privacy protection requirements (CIA 2 ) Application security Sharing information & Convergence Needs & Priorities
E N D
Privacy Protection Techniques & Security B. Claerhout
Scope of the Topic • Technical solutions for implementing necessary security & privacy protection requirements (CIA2) • Application security • Sharing information & Convergence • Needs & Priorities • Also from the “operational”, “business” perspective • Technological challenges & gaps • Interoperability (technological & operational) • Joint session synergy between: • procedures / contractual agreements / technical measures
Contributing Projects Technically very well aligned EC DG Connect
Convergence Challenges Technical topics addressed: IdM, AAA & PETs • Alignment/comparison of needs and prioritisation • Identification of external/operational/business requirements • Care environments (hospitals) / Research centres / Pharmaceutical industry • “New” challenges? • E.g. Cloud • Technical Standards used in projects implementations • Lack of (technical) standards: Audit & Privacy Protection • Convergence between project solutions • Technical interoperability • Operational interoperability • Convergence scenarios • May lead to practical experiments (Hackaton?)