Access control and the resource description framework: A survey
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …
and consume structured data using the existing web infrastructure, commonly referred to as …
A recommendation approach for user privacy preferences in the fitness domain
Fitness trackers are undoubtedly gaining in popularity. As fitness-related data are
persistently captured, stored, and processed by these devices, the need to ensure users' …
persistently captured, stored, and processed by these devices, the need to ensure users' …
4W1H in IoT semantics
IoT systems are now being deployed worldwide to sense phenomena of interest. The
existing IoT systems are often independent, which limits the use of sensor data to only one …
existing IoT systems are often independent, which limits the use of sensor data to only one …
Enterprise knowledge graphs: a backbone of linked enterprise data
Semantic technologies in enterprises have recently received increasing attention from both
the research and industrial side. The concept of Linked Enterprise Data (LED) describes a …
the research and industrial side. The concept of Linked Enterprise Data (LED) describes a …
Semantic-based privacy settings negotiation and management
By 2020, an individual is expected to own an average of 6.58 devices that share and
integrate a wealth of personal user data. The management of privacy preferences across …
integrate a wealth of personal user data. The management of privacy preferences across …
Linked data authorization platform
The expansion of the smart devices, the growing popularity of the social networks, and the
wide spread of the corporate services impose huge amounts of heterogeneous data to be …
wide spread of the corporate services impose huge amounts of heterogeneous data to be …
Gdpr-inspired iot ontology enabling semantic interoperability, federation of deployments and privacy-preserving applications
Testing and experimentation are crucial for promoting innovation and building systems that
can evolve to meet high levels of service quality. IoT data that belong to users and from …
can evolve to meet high levels of service quality. IoT data that belong to users and from …
Fine-grained trust assertions for privacy management in the social semantic web
Social Web applications are engineered around users sharing personal information with
their connected peers. They provide generic privacy settings which user specify with whom …
their connected peers. They provide generic privacy settings which user specify with whom …
Feasibility of Structured, Machine-Readable Privacy Notices
This paper offers a novel approach to the long standing problem of the interface of humans
and online privacy notices. As literature and practice, and even art, for more than a decade …
and online privacy notices. As literature and practice, and even art, for more than a decade …
Security and privacy controls for streaming data in extended intelligent environments
D Preuveneers, W Joosen - Journal of Ambient Intelligence …, 2016 - content.iospress.com
Intelligent environments collect and process personal information to assist individuals with
their daily activities, enhance their experiences and adapt to their needs and intentions. The …
their daily activities, enhance their experiences and adapt to their needs and intentions. The …