Summary
This deliverable based on task 31 32 and 33 will lead to a report with1A description of security and privacy methods and protocols covering sensor integrity communications data storage and sharing 2An analysis of legal hinders to utilize data3A description of anonymization techniques such as kanonymity generalization and perturbation This deliverable will provide input for demonstrations in WP4 and tasks 51 and 53
More information & hyperlinks