In this blog, the ENCRYPT project explores how privacy-preserving technologies like Trusted Execution Environments (TEEs) can enable secure record linkage across healthcare institutions, especially in legally complex contexts like Germany.
by
Nima Faraji (TRUSTUP) and Dativa Tibyampansha (Johannes Gutenberg-Universität Mainz).
Implementation of a tool for risk assessment of personal data processing using a methodology based on the LINDDUN and MITRE ATT&CK frameworks
Uncover how cutting-edge frameworks like LINDDUN and MITRE ATT&CK come together with ENISA’s methodology to revolutionize privacy risk assessment. Dive into how a domain-specific approach for healthcare, fintech, and CTI reshapes data security, helping you outsmart threats and protect assets.
Leveraging Large Language Models (LLMs) for Mapping Tabular Data to Ontologies
Automate Data Integration with Large Language Models (LLMs): Discover how LLMs can streamline the mapping of tabular data to ontologies, transforming raw data into structured insights and driving efficiency in data management.
by Mary Papoutsoglou, Aristotle University of Thessaloniki.
Homomorphic Encryption Applied to Various Use Cases
Discover how homomorphic encryption is used for data security by enabling computations on encrypted data, safeguarding privacy even during processing. From determining loan eligibility in FinTech to detecting cyber threats and confidential medical analysis, this cutting-edge technology is transforming how we handle sensitive information.
Differential Privacy within ENCRYPT: Ensuring Privacy While Maximizing Data Utility
Explore how Differential Privacy empowers ENCRYPT to safeguard data privacy while optimizing data utility, offering users a simple yet effective means to protect their data without sacrificing analytical insights.
Enhancing CTI Extraction Using Privacy-Preserving Techniques
Explore how Fully Homomorphic Encryption and Trusted Execution Environments revolutionize Cyber Threat Intelligence extraction by enabling secure and private analysis of sensitive data to combat evolving cyber threats.
by Angelos Papoutsis, Research Associate, Centre for Research and Technology Hellas