{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:08:54Z","timestamp":1774721334031,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T00:00:00Z","timestamp":1578960000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T00:00:00Z","timestamp":1578960000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["861213"],"award-info":[{"award-number":["861213"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["731601"],"award-info":[{"award-number":["731601"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Christian Doppler Research Association, and the Austrian Federal Ministry for Digital & Economic Affairs and the National Foundation for Research, Technology and Development","award":["Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle (CDL-SQI)"],"award-info":[{"award-number":["Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle (CDL-SQI)"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s00779-019-01330-0","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T03:02:45Z","timestamp":1578970965000},"page":"465-486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["User consent modeling for ensuring transparency and compliance in smart cities"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2683-827X","authenticated-orcid":false,"given":"Javier D.","family":"Fern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Marta","family":"Sabou","sequence":"additional","affiliation":[]},{"given":"Sabrina","family":"Kirrane","sequence":"additional","affiliation":[]},{"given":"Elmar","family":"Kiesling","sequence":"additional","affiliation":[]},{"given":"Fajar J.","family":"Ekaputra","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Azzam","sequence":"additional","affiliation":[]},{"given":"Rigo","family":"Wenning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,14]]},"reference":[{"key":"1330_CR1","unstructured":"Aggarwal CC, Philip SY (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining. Springer, pp 11\u201352"},{"key":"1330_CR2","unstructured":"Bellare M, Yee B (1997) Forward integrity for secure audit logs. Tech. rep., Computer Science and Engineering Department University of California at San Diego"},{"key":"1330_CR3","doi-asserted-by":"crossref","unstructured":"Bermejo A, Villadangos J, Astrain JJ, Cordoba A (2013) Ontology based road traffic management. In: Proc. of intelligent distributed computing. Springer, pp 103\u2013108","DOI":"10.1007\/978-3-642-32524-3_14"},{"key":"1330_CR4","unstructured":"Bonatti P, Kirrane S, Petrova I, Sauro L, Kerschbaum C, Pirkova E (2018) Special deliverable 2.6: formal representation of the legislation v2. https:\/\/www.specialprivacy.eu\/images\/documents\/SPECIAL_D26_M21_V10.pdf"},{"key":"1330_CR5","unstructured":"Bonatti P, Kirrane S, Petrova I, Sauro L, Schlehahn E (2017) Special deliverable 2.1: policy language v1. https:\/\/www.specialprivacy.eu\/images\/documents\/SPECIAL_D2.1_M12_V1.0.pdf https:\/\/www.specialprivacy.eu\/images\/documents\/SPECIAL_D2.1_M12_V1.0.pdf"},{"key":"1330_CR6","doi-asserted-by":"crossref","unstructured":"Bonatti P, Kirrane S, Polleres A, Wenning R (2017) Transparent personal data processing: the road ahead. In: Proc. of TELERISE, pp 337\u2013349","DOI":"10.1007\/978-3-319-66284-8_28"},{"issue":"11","key":"1330_CR7","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/TKDE.2010.83","volume":"22","author":"PA Bonatti","year":"2010","unstructured":"Bonatti PA, Coi JLD, Olmedilla D, Sauro L (2010) A rule-based trust negotiation system. IEEE Trans Knowl Data Eng 22(11):1507\u20131520","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1330_CR8","doi-asserted-by":"crossref","unstructured":"Bonatti PA, Kirrane S (2019) Big data and analytics in the age of the gdpr","DOI":"10.1109\/BigDataCongress.2019.00015"},{"key":"1330_CR9","unstructured":"Brickley D, Miller L (2010) Foaf vocabulary specification 0.91"},{"key":"1330_CR10","unstructured":"Cavoukian A (2011) Privacy by design in law, policy and practice. A white paper for regulators decision-makers and policy-makers"},{"issue":"2","key":"1330_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCOM.2017.1600699CM","volume":"55","author":"S Chen","year":"2017","unstructured":"Chen S, Liu T, Gao F, Ji J, Xu Z, Qian B, Wu H, Guan X (2017) Butler, not servant: a human-centric smart home energy management system. IEEE Commun Mag 55(2):27\u201333","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"1330_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.giq.2017.11.008","volume":"35","author":"G Cledou","year":"2018","unstructured":"Cledou G, Estevez E, Barbosa LS (2018) A taxonomy for planning and designing smart mobility services. Gov Inf Q 35(1):61\u201376","journal-title":"Gov Inf Q"},{"key":"1330_CR13","unstructured":"Cranor LF (2002) Web privacy with P3P - the platform for privacy preferences. O\u2019Reilly"},{"key":"1330_CR14","doi-asserted-by":"crossref","unstructured":"Dao MS, Pongpaichet S, Jalali L, Kim K, Jain R, Zettsu K (2014) A real-time complex event discovery platform for cyber-physical-social systems. Proc of ICMR, 201\u2013208","DOI":"10.1145\/2578726.2578755"},{"issue":"1","key":"1330_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/app9010032","volume":"9","author":"P Espinoza-Arias","year":"2019","unstructured":"Espinoza-Arias P, Poveda-Villal\u00f3n M, Garc\u00eda-Castro R, Corcho O (2019) Ontological representation of smart city data: from devices to cities. Appl Sci 9(1):32","journal-title":"Appl Sci"},{"key":"1330_CR16","unstructured":"Falkvinge R (2017) Airport: \u201cwe\u2019re tracking every single footstep you take and can connect it to your mail address, but your privacy is safe because we say so\u201d. https:\/\/falkvinge.net\/2017\/04\/15\/schiphol-airport-tracking-every-single-footstep\/"},{"key":"1330_CR17","unstructured":"Fatema K, Hadziselimovic E, Pandit HJ, Debruyne C, Lewis D, O\u2019Sullivan D (2017) Compliance through informed consent: semantic based consent permission and data management model. In: Proc of PrivOn"},{"key":"1330_CR18","unstructured":"Ghinita G, Karras P, Kalnis P, Mamoulis N (2007) Fast data anonymization with low information loss. In: Proc. of VLDB. VLDB Endowment, pp 758\u2013769"},{"key":"1330_CR19","doi-asserted-by":"crossref","unstructured":"Hildebrandt M (2015) Smart technologies and the end (s) of law: novel entanglements of law and technology. Edward Elgar Publishing","DOI":"10.4337\/9781849808774"},{"issue":"3","key":"1330_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MIC.2015.27","volume":"19","author":"D Hussein","year":"2015","unstructured":"Hussein D, Park S, Han SN, Crespi N (2015) Dynamic social structure of things: a contextual approach in CPSS. IEEE Internet Comput 19(3):12\u201320","journal-title":"IEEE Internet Comput"},{"key":"1330_CR21","unstructured":"Iannella R, Villata S (2018) Odrl information model 2.2\/ W3C Recommendation"},{"key":"1330_CR22","unstructured":"Information Commissioner\u2019s Office (ICO) UK (2017) Getting ready for the GDPR. https:\/\/ico.org.uk\/for-organisations\/resources-and-support\/data-protection-self-assessment\/getting-ready-for-the-gdpr\/ https:\/\/ico.org.uk\/for-organisations\/resources-and-support\/data-protection-self-assessment\/getting-ready-for-the-gdpr\/ https:\/\/ico.org.uk\/for-organisations\/resources-and-support\/data-protection-self-assessment\/getting-ready-for-the-gdpr\/"},{"key":"1330_CR23","unstructured":"Kagal L, Finin TW, Joshi A (2003) A policy language for a pervasive computing environment. In: Proc. of POLICY, pp 63\u2013"},{"issue":"6","key":"1330_CR24","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.infsof.2010.12.011","volume":"53","author":"BA Kitchenham","year":"2011","unstructured":"Kitchenham BA, Budgen D, Pearl Brereton O (2011) Using mapping studies as the basis for further research - a participant-observer case study. Inf Softw Technol 53(6):638\u2013651","journal-title":"Inf Softw Technol"},{"key":"1330_CR25","doi-asserted-by":"crossref","unstructured":"Kolovski V, Hendler J, Parsia B (2007) Analyzing web access control policies. In: Proc. of WWW, pp 677\u2013686","DOI":"10.1145\/1242572.1242664"},{"key":"1330_CR26","unstructured":"Lebo T, Sahoo S, McGuinness D (2013) Prov-o: the prov ontology. W3C Recommendation"},{"key":"1330_CR27","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly LT, Maggi FM, Montali M, Rinderle-Ma S, van der Aalst WM (2015) Compliance monitoring in business processes: functionalities, application, and tool-support. Inform Syst 54:209\u2013234","journal-title":"Inform Syst"},{"key":"1330_CR28","unstructured":"Microsoft Trust Center (2017) Detailed GDPR assessment. http:\/\/aka.ms\/gdprdetailedassessment"},{"key":"1330_CR29","doi-asserted-by":"crossref","unstructured":"Mont MC, Pearson S, Bramhall P (2003) Towards accountable management of identity and privacy: sticky policies and enforceable tracing services. In: Database and expert systems applications. IEEE, pp 377\u2013382","DOI":"10.1109\/DEXA.2003.1232051"},{"key":"1330_CR30","unstructured":"Motik B, Patel-Schneider PF, Parsia B (2012) OWL 2 web ontology language \u2013 structural specification and functional-style syntax, 2nd edn. W3C Recommendation"},{"key":"1330_CR31","unstructured":"Nymity (2017) GDPR compliance toolkit. https:\/\/www.nymity.com\/gdpr-toolkit.aspx"},{"key":"1330_CR32","unstructured":"Pandit H, Lewis D (2017) Modelling provenance for gdpr compliance using linked open data vocabularies. In: Proc of PrivOn"},{"key":"1330_CR33","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.aei.2017.02.003","volume":"33","author":"M Peruzzini","year":"2017","unstructured":"Peruzzini M, Pellicciari M (2017) A framework to design a human-centred adaptive manufacturing system for aging workers. Adv Eng Inform 33:330\u2013349","journal-title":"Adv Eng Inform"},{"key":"1330_CR34","doi-asserted-by":"crossref","unstructured":"Pulls T, Peeters R, Wouters K (2013) Distributed privacy-preserving transparency logging. In: Proc. of WPES","DOI":"10.1145\/2517840.2517847"},{"key":"1330_CR35","unstructured":"Sabou M, Musil A (2018) Cityspin deliverable 2.1: cyber-physical social systems blueprint (v.1). http:\/\/cityspin.net\/wp-content\/uploads\/2017\/10\/D2.1.pdf"},{"key":"1330_CR36","unstructured":"Sabou M, Musil A, Musil J, Biffl S (2018) Protocol for: a systematic mapping study of cyber-physical social systems. Tech. Rep. IFS-QSE 18-02, TU Wien, Austria. http:\/\/qse.ifs.tuwien.ac.at\/publication\/IFS-QSE-18-02.pdf"},{"key":"1330_CR37","doi-asserted-by":"crossref","unstructured":"Sackmann S, Str\u00fcker J, Accorsi R (2006) Personalization in privacy-aware highly dynamic systems. Commun ACM, 49(9)","DOI":"10.1145\/1151030.1151052"},{"issue":"3","key":"1330_CR38","doi-asserted-by":"publisher","first-page":"177","DOI":"10.3233\/AO-2011-0096","volume":"6","author":"A Scherp","year":"2011","unstructured":"Scherp A, Saathoff C, Franz T, Staab S (2011) Designing core ontologies. Appl Ontol 6(3):177\u2013221. http:\/\/dl.acm.org\/citation.cfm?id=2351285.2351289","journal-title":"Appl Ontol"},{"key":"1330_CR39","unstructured":"Schreiber G, Raimond Y (2014) Rdf 1.1 primer"},{"key":"1330_CR40","doi-asserted-by":"crossref","unstructured":"Smirnov A, Shilov N, Gusikhin O (2015) Socio-cyberphysical system for proactive driver support - approach and case study. In: Proc of ICINCO, pp 289\u2013295","DOI":"10.5220\/0005540702890295"},{"key":"1330_CR41","doi-asserted-by":"crossref","unstructured":"Sutton A, Samavi R (2017) Blockchain enabled privacy audit logs. In: Proc. of ISWC, pp 645\u2013660","DOI":"10.1007\/978-3-319-68288-4_38"},{"key":"1330_CR42","doi-asserted-by":"crossref","unstructured":"Uszok A, Bradshaw JM, Jeffers R, Suri N, Hayes PJ, Breedy MR, Bunch L, Johnson M, Kulkarni S, Lott J (2003) KAoS policy and domain services: towards a description-logic approach to policy representation, deconfliction, and enforcement. In: Proc. of POLICY, pp 93\u201396","DOI":"10.1109\/POLICY.2003.1206963"},{"issue":"4","key":"1330_CR43","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MIS.2010.104","volume":"25","author":"FY Wang","year":"2010","unstructured":"Wang FY (2010) The emergence of intelligent enterprises: from CPS to CPSS. IEEE Intell Syst 25(4):85\u201388","journal-title":"IEEE Intell Syst"},{"issue":"5","key":"1330_CR44","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/THMS.2014.2382570","volume":"45","author":"J Xiao","year":"2015","unstructured":"Xiao J, Joseph SL, Zhang X, Li B, Li X, Zhang J (2015) An assistive navigation framework for the visually impaired. IEEE Trans Human-Mach Syst 45(5):635\u2013640","journal-title":"IEEE Trans Human-Mach Syst"},{"issue":"3","key":"1330_CR45","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/JAS.2015.7152667","volume":"2","author":"G Xiong","year":"2015","unstructured":"Xiong G, Zhu F, Liu X, Dong X, Huang W, Chen S, Zhao K (2015) Cyber-physical-social system in intelligent transportation. IEEE\/CAA J Automatica Sinica 2(3):320\u2013333","journal-title":"IEEE\/CAA J Automatica Sinica"},{"key":"1330_CR46","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O, et al. (2015) Decentralizing privacy: using blockchain to protect personal data. In: Proc. of SPW, pp 180\u2013 184","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01330-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01330-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01330-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T04:20:46Z","timestamp":1665462046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01330-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,14]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["1330"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01330-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,14]]},"assertion":[{"value":"4 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}