2016 IEEE Cybersecurity Development (SecDev) 2016
DOI: 10.1109/secdev.2016.048
|View full text |Cite
|
Sign up to set email alerts
|

Secure DevOps Process and Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The approach to GDPR-compliance is direct implementation of the key GDPR principles of "data protection by design" and "data protection by default". Data protection tools are embedded in a common HIE infrastructure that is deployable by Secure DevOps technology [10]. The information exchange infrastructure is based on an extended OpenNCP architecture [11] itself implementing components of EpSOS [12].…”
Section: Approach To Secure Cross-border Exchange (Shield)mentioning
confidence: 99%
“…The approach to GDPR-compliance is direct implementation of the key GDPR principles of "data protection by design" and "data protection by default". Data protection tools are embedded in a common HIE infrastructure that is deployable by Secure DevOps technology [10]. The information exchange infrastructure is based on an extended OpenNCP architecture [11] itself implementing components of EpSOS [12].…”
Section: Approach To Secure Cross-border Exchange (Shield)mentioning
confidence: 99%