2023
DOI: 10.3390/info14070411
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Solid Protocol in Relation to Security and Privacy Obligations

Christian Esposito,
Ross Horne,
Livio Robaldo
et al.

Abstract: The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, security and privacy represent pivotal issues to be addressed. By analysing the relevant legislation, with an emphasis on GDPR and officially approved documents such as codes of conduct and relevant security ISO standards, we formulate the primary security and pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…Pandit analyzed this technology in terms of the actors involved, according to existing standards related to cloud technology, in order to identify GDPR issues that are still applicable in decentralized settings, such as the transparency of information, purpose limitation and exercising of data subject's rights [25]. Esposito et al also provide a theoretical analysis of security and privacy measures to comply with the GDPR's principles of confidentiality and data minimization and to safeguard the data subjects' rights of notification, to object and to not be subjected to automated decision-making [26]. Other researchers have been focused on adding a legally compatible policy layer to Solid as a tool to express consent and determine access [27,28] and usage control [29] to data stored in Pods and on using the Verifiable Credential model to have an attribute-based access control mechanism [30].…”
Section: Introductionmentioning
confidence: 99%
“…Pandit analyzed this technology in terms of the actors involved, according to existing standards related to cloud technology, in order to identify GDPR issues that are still applicable in decentralized settings, such as the transparency of information, purpose limitation and exercising of data subject's rights [25]. Esposito et al also provide a theoretical analysis of security and privacy measures to comply with the GDPR's principles of confidentiality and data minimization and to safeguard the data subjects' rights of notification, to object and to not be subjected to automated decision-making [26]. Other researchers have been focused on adding a legally compatible policy layer to Solid as a tool to express consent and determine access [27,28] and usage control [29] to data stored in Pods and on using the Verifiable Credential model to have an attribute-based access control mechanism [30].…”
Section: Introductionmentioning
confidence: 99%