5 research outputs found

    Emulation for Digital Preservation in Practice: The Results

    Get PDF
    In recent years a lot of research has been undertaken to ascertain the most suitable preservation approach. For a long time migration was seen as the only viable approach, whereas emulation was looked upon with scepticism due to its technical complexity and initial costs. In 2004, the National Library of the Netherlands (Koninklijke Bibliotheek, [KB]) and the Nationaal Archief of the Netherlands acknowledged the need for emulation, especially for rendering complex digital objects without affecting their authenticity and integrity. A project was started to investigate the feasibility of emulation by developing and testing an emulator designed for digital preservation purposes. In July 2007 this project ended and delivered a durable x86 component-based computer emulator: Dioscuri, the first modular emulator for digital preservation

    Guidelines for public administrations on location privacy

    Get PDF
    Public administrations increasingly use location data to deliver public services, including location-enabled tools, apps for tourists, toll collection services and cadastral web applications. Location data, such as addresses, GPS coordinates or camera images, is key to many public services and can also be linked to all sorts of other data, generating new information that was not available before. Despite the increased consumption of location data, its potential to reveal personal information is often underestimated, especially in comparison to other sensitive data, for instance in the financial and health domains. Location data not only say where an individual is, but it also says who he/she is and what his/her interests and preferences are. Therefore, location data privacy is of paramount importance for public administrations dealing with location data. While location data privacy has many aspects in common with general data protection principles, it also has unique characteristics that require specific consideration. The goal of this guidance document is therefore twofold: to outline the key obligations that public administrations should comply with when handling personal location data and raising awareness about the importance of location data privacy, highlighting key implications and risks associated with the processing of location data. It does so by guiding the reader through concrete scenarios that public administrations might face when processing personal location data and provides a set of effective and practical recommendations that can help ensure the adequate protection of personal location data. The guidance has been updated following the introduction of GDPR, taking into account market research in the location industry of the impact of GDPR. The updated document includes new models and concepts as well as using examples throughout to illustrate changes and potential approaches. It is a guide to practitioners and while touching on the key relevant parts of GDPR, it is not a legal document or legal advice.JRC.B.6-Digital Econom

    Extending the Belgian eID technology with mobile security functionality

    No full text
    The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. A major reason is the lack of killer functionality and killer applications. This paper presents two reusable extensions to the Belgian eID technology that opens up new opportunities for application developers. First, a secure and ubiquitously accessible remote storage service is presented. Second, we show how the eID card can be used to issue new certificates. To demonstrate the applicability and feasibility of both extensions, they are combined in the development of a secure e-mail application. The proposed solution offers strong privacy, security and key management properties while increasing the accessibility of confidential e-mail compared to existing solutions (such as PGP and S/MIME).status: publishe

    Building advanced applications with the Belgian eID

    No full text
    The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to digitally prove their identity and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. An important reason is the lack of killer functionality and killer applications. This paper presents two reusable extensions to the Belgian eID technology that opens up new opportunities for application developers. First, a secure and ubiquitously accessible remote storage service is presented. Second, it is shown how the eID card can be used to issue new certificates. The feasibility and reusability of both extensions are validated through the development of several applications in different domains.status: publishe
    corecore