2016
DOI: 10.1016/j.clsr.2015.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 0 publications
0
4
0
1
Order By: Relevance
“…Any application that handles sensitive data must find ways to guarantee the respective privacy, integrity, and confidentiality, and it is in fact legally obligated to do so in many jurisdictions [63]. In particular, the disclosure of private clinical information is a risk that must be considered.…”
Section: Security Mechanisms Implementation and Validationmentioning
confidence: 99%
“…Any application that handles sensitive data must find ways to guarantee the respective privacy, integrity, and confidentiality, and it is in fact legally obligated to do so in many jurisdictions [63]. In particular, the disclosure of private clinical information is a risk that must be considered.…”
Section: Security Mechanisms Implementation and Validationmentioning
confidence: 99%
“…The primary purpose of the authentication process is to allow only legitimate users for which they are eligible and prohibit those users who are not valid (Khattri and Singh, 2019;Khattri and Singh, 2018a;Dasgupta et al, 2017;Kennedy and Millard, 2016;Gunson et al, 2011;Barker et al, 2008). At the initial level of security, the most useful authentication process is the password, and it implements in almost all applications.…”
Section: Plastic Card Fraud Prevention Techniques 21 Authenticationmentioning
confidence: 99%
“…In some cases, where the data involved may be particularly revealing, it may be good practice to employ means for more stringent authentication. Where more than one method of contacting the data subject is available, the use of multi-factor authentication (perhaps coupled with request validation, see below) may be appropriate [9].…”
Section: A User Authenticationmentioning
confidence: 99%