About
38
Publications
4,185
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
57
Citations
Introduction
Skills and Expertise
Publications
Publications (38)
National digital identity systems have become a key requirement for easy access to online public services, specially during Covid-19. While many countries have adopted a national digital identity system, many are still in the process of establishing one. Through a comparative analysis of the technological and legal dimensions of a few selected nati...
The design and management of digital identity is a complex challenge. On the one hand, it requires a clear understanding of the parameters that are involved in identity management. On the other hand, it requires the cooperation of many stakeholders. In particular, this involves those public authorities and private organisations that need to be alig...
Automated driving vehicles are equipped with digital computational functions using sensors and on-board computers to replace the human driver. They are connected to a specific infrastructure. Their development is often motivated by the improvement of road safety through eliminating human failures, by a wider range of mobility options, lower emissio...
Le véhicule à conduite automatisée, dans lequel des fonctions numériques utilisant des capteurs
et des calculateurs embarqués se substituent au conducteur, et qui est connecté à une
infrastructure spécifique, est souvent motivé par l’amélioration de la sécurité routière, en éliminant
les défaillances humaines, par l’élargissement de l’offre de moye...
Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data, where involved entities may massively collect and process massive amounts of such data. Toward the...
Tomorrow, the rise of the Internet of Things will allow us to collect and process a growing amount of real-time data related to our body. This phenomenon will unlock new opportunities both in health- and non-health-related sectors but also challenge the frontiers of what we used to consider private. Beyond these frontiers, not all data is created w...
Les identités numériques tiennent un rôle prépondérant dans l'actualité, provoquant travaux et débats intenses, au sujet de l'évolution des usages sur Internet comme de l'émergence de nouveaux services numériques. Le manque de maîtrise des technologies utilisées, la recrudescence des délits d'usurpation d'identités, la volonté de l'Europe et de la...
Les identités numériques tiennent un rôle prépondérant dans l'actualité, provoquant travaux et débats intenses, au sujet de l'évolution des usages sur Internet comme de l'émergence de nouveaux services numériques. Le manque de maîtrise des technologies utilisées, la recrudescence des délits d'usurpation d'identités, la volonté de l'Europe et de la...
The use of privacy protection measures is of particular importance for existing and upcoming users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying the way they should be implemented. The pap...
Les identités numériques tiennent un rôle prépondérant dans
l’actualité, provoquant travaux et débats intenses, au sujet de
l’évolution des usages sur Internet comme de l’émergence de
nouveaux services numériques. Le manque de maîtrise des
technologies utilisées, la recrudescence des délits d’usurpation
d’identités, la volonté de l’Europe et de la...
p>This article analyses the social and legal construction of an interactive advertising project. The project consisted in the transmission of multimedia content, via Bluetooth, to the mobile phones of users at stations in the Paris underground. In this case the legal qualification of the Bluetooth identifier and the modalities for obtaining users'...
This article analyses the social and legal construction of an interactive advertising project. The project consists in sending multimedia content, via Bluetooth, to the mobile phones of users at stations in the Paris underground within a few dozen meters of the Bluetooth emitter. The legal qualification of the Bluetooth identifier and the modalitie...
L'offre de services de géolocalisation via un téléphone mobile implique de connaître la localisation et l'identifiant du téléphone, donc de collecter des données relatives à un utilisateur identifié ou identifiable. À ce titre, la loi Informatique et Libertés exige que l'utilisateur consente en toute transparence à bénéficier d'un service géolocali...