References
[2]. Agrafiotis, I. (2012). Enhancing User's Privacy: Developing a Model for Managing and Testing the Lifecycle of Consent and Revocation (Doctoral dissertation, University of Warwick).
[3]. Bax, M. P., & Barbosa, J. L. (2020, November). Proposta de mecanismo de consentimento na lei geral de proteção de dados-LGPD. Universidade Federal de Minas Gerais.
[4]. Biksham, V., & Vasumathi, D. (2017). Homomorphic encryption techniques for securing data in cloud computing: A survey. International Journal of Computer Applications, 160 (6), 1-5.
[5].
Bogetoft, P., Christensen, D. L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., & Toft, T. (2009, February). Secure multiparty computation goes live. In International Conference on Financial Cryptography and Data Security (pp. 325-343). Springer Berlin Heidelberg.
[6]. Burian, P. E., Rogerson, L., & Maffei III, F. R. (2010). The research roadmap: A primer to the approach and process. Contemporary Issues in Education Research, 3(8), 43-58.
[7]. Cavoukian, A. (2009). Privacy by Design: The 7 Foundational Principles. Information and Privacy Commissioner of Ontario, Canada.
[8]. Chugh, R. (2023). Data privacy and the legal implications of emerging technologies. Journal of Emerging Technologies and Innovative Research (JETIR), 10 (11), e219-e240.
[9]. Colesky, M., Hoepman, J. H., & Hillen, C. (2016, May). A critical analysis of privacy design strategies. In 2016 IEEE Security and Privacy Workshops (SPW) (pp. 33-40). IEEE.
[10]. Cranor, L. F. (2012). Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, 10, 273.
[11].
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L., Tirtea, R., & Schiffner, S. (2015). Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726.
[14]. Kadam, S. (2018, March). Review of distributed ledgers: The technological advances behind cryptocurrency. In International Conference Advances in Computer Technology and Management (ICACTM) (pp. 1-5).
[18]. Nissenbaum, H. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.
[21]. Özkoç, E. E. (2021). Privacy Preserving Data Mining. ResearchGate.
[25]. Schaub, F., Balebako, R., Durity, A. L., & Cranor, L. F. (2015). A design space for effective privacy notices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015) (pp. 1-17).
[27].
Valadares, D. C. G., Will, N. C., Caminha, J., Perkusich, M. B., Perkusich, A., & Gorgônio, K. C. (2021). Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications. IEEE Access, 9, 80953-80969.
[28].
Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D. J., & Shadbolt, N. (2017, May). Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 5208-5220).
[29].
Wen, J., Zhang, Z., Lan, Y., Cui, Z., Cai, J., & Zhang,
W. (2023). A survey on federated learning: Challenges and applications. International Journal of Machine Learning and Cybernetics, 14(2), 513-535.