Analysis of ontologies and policy languages to represent information flows in GDPR
B Esteves, V Rodríguez-Doncel - Semantic Web, 2024 - content.iospress.com
This article surveys existing vocabularies, ontologies and policy languages that can be used
to represent informational items referenced in GDPR rights and obligations, such as the …
to represent informational items referenced in GDPR rights and obligations, such as the …
Access control and the resource description framework: A survey
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …
and consume structured data using the existing web infrastructure, commonly referred to as …
Semantic-based privacy settings negotiation and management
By 2020, an individual is expected to own an average of 6.58 devices that share and
integrate a wealth of personal user data. The management of privacy preferences across …
integrate a wealth of personal user data. The management of privacy preferences across …
PPO & PPM 2.0 extending the privacy preference framework to provide finer-grained access control for the web of data
O Sacco, JG Breslin - Proceedings of the 8th International Conference …, 2012 - dl.acm.org
Web of Data applications provide users with the means to easily publish their personal
information on the Web. However, this information is publicly accessible and users cannot …
information on the Web. However, this information is publicly accessible and users cannot …
Linked data authorization platform
The expansion of the smart devices, the growing popularity of the social networks, and the
wide spread of the corporate services impose huge amounts of heterogeneous data to be …
wide spread of the corporate services impose huge amounts of heterogeneous data to be …
Towards querying in decentralized environments with privacy-preserving aggregation
The Web is a ubiquitous economic, educational, and collaborative space. However, it also
serves as a haven for personal information harvesting. Existing decentralised Web-based …
serves as a haven for personal information harvesting. Existing decentralised Web-based …
Access control in linked data using webid
P Mainini, A Laube-Rosenpflanzer - arXiv preprint arXiv:1611.03019, 2016 - arxiv.org
Linked Data technologies become increasingly important in many domains. Key factors for
their breakthrough are security and trust, especially when sensible or personal data are …
their breakthrough are security and trust, especially when sensible or personal data are …
A social semantic web access control model
S Villata, L Costabello, N Delaforge… - Journal on Data …, 2013 - Springer
Abstract In the Social Web, the users are invited to publish a lot of personal information.
These data can be easily retrieved, and sometimes reused, without providing the users with …
These data can be easily retrieved, and sometimes reused, without providing the users with …
Fine-grained trust assertions for privacy management in the social semantic web
Social Web applications are engineered around users sharing personal information with
their connected peers. They provide generic privacy settings which user specify with whom …
their connected peers. They provide generic privacy settings which user specify with whom …
In users we trust: towards social user interactions based Trust Assertions for the Social Semantic Web
O Sacco, JG Breslin - Social Network Analysis and Mining, 2014 - Springer
Current approaches for asserting trust focus on propagating known trust values amongst
peers in a trusted network and do not provide measures for asserting a trust value from user …
peers in a trusted network and do not provide measures for asserting a trust value from user …