{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:32:45Z","timestamp":1760661165825,"version":"build-2065373602"},"reference-count":112,"publisher":"Association for Computing Machinery (ACM)","issue":"7","funder":[{"DOI":"10.13039\/501100004211","name":"Oxford Martin School, University of Oxford","doi-asserted-by":"publisher","award":["Ethical Web and Data Architecture in the Age of AI"],"award-info":[{"award-number":["Ethical Web and Data Architecture in the Age of AI"]}],"id":[{"id":"10.13039\/501100004211","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>Data and their processing have become an indispensable aspect for our society. Insights drawn from collective data make invaluable contribution to scientific, societal and communal research and business. However, there are increasing worries about privacy issues and data misuse, prompting the emergence of decentralised personal data stores (PDS) like Solid. However, existing PDS frameworks face challenges in ensuring data privacy when performing collective computation to combine data from multiple users. At a glance, Secure Multi-Party Computation (MPC) offers input secrecy protection while performing collective computation without relying on any single party. However, issues emerge when directly applying MPC in the context of PDS, particularly due to key factors like autonomy and decentralisation. In this work, we discuss the essence of this issue, identify the potential solution, and introduce a modular system architecture, Libertas, to integrate MPC with PDS like Solid, without requiring protocol-level changes. We introduce the paradigm shift from an 'omniscient' view to individual-based, user-centric view of trust and security, and discuss the threat model of Libertas. Two realistic use cases for collaborative data processing are used for evaluation, both for technical feasibility and empirical benchmark, highlighting its effectiveness in empowering gig workers and generating differentially private synthetic data. The results of our experiments underscore Libertas' linear scalability and provide valuable insights into compute optimisations, thereby advancing the state-of-the-art in privacy-preserving data processing practices. By offering practical solutions for maintaining both individual autonomy and privacy in collaborative data processing environments, Libertas contributes significantly to the ongoing discourse on privacy protection in data-driven decision-making contexts.<\/jats:p>","DOI":"10.1145\/3757490","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:32:00Z","timestamp":1760635920000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Libertas: Privacy-Preserving Collaborative Computation for Decentralised Personal Data Stores"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2993-2023","authenticated-orcid":false,"given":"Rui","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5106-5889","authenticated-orcid":false,"given":"Naman","family":"Goel","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9337-4479","authenticated-orcid":false,"given":"Nitin","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6935-9028","authenticated-orcid":false,"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6344-7526","authenticated-orcid":false,"given":"Jake","family":"Stein","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8334-5738","authenticated-orcid":false,"given":"Wael S","family":"Albayaydh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universoty of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8596-222X","authenticated-orcid":false,"given":"Ruben","family":"Verborgh","sequence":"additional","affiliation":[{"name":"IDLab, Ghent University, Ghent, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8272-5667","authenticated-orcid":false,"given":"Reuben","family":"Binns","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1279-3709","authenticated-orcid":false,"given":"Tim","family":"Berners-Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5085-9724","authenticated-orcid":false,"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_6"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/jcpy.1191"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.54.2.442"},{"key":"e_1_2_2_5_1","volume-title":"Beyond the Privacy Paradox. MIS quarterly","author":"Adjerid Idris","year":"2018","unstructured":"Idris Adjerid, Eyal Peer, and Alessandro Acquisti. 2018. Beyond the Privacy Paradox. MIS quarterly, Vol. 42, 2 (2018), 465-488."},{"key":"e_1_2_2_6_1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1080\/01972243.2020.1870596","article-title":"This is capitalism. It is not illegal'': Users' attitudes toward institutional privacy following the Cambridge Analytica scandal","volume":"37","author":"Afriat Hagar","year":"2021","unstructured":"Hagar Afriat, Shira Dvir-Gvirsman, Keren Tsuriel, and Lidor Ivan. 2021. ''This is capitalism. It is not illegal'': Users' attitudes toward institutional privacy following the Cambridge Analytica scandal. The Information Society, Vol. 37, 2 (2021), 115-127. hrefhttps:\/\/doi.org\/10\/gn8nv3doi:10\/gn8nv3.","journal-title":"The Information Society"},{"key":"e_1_2_2_7_1","unstructured":"Wael Albayaydh and Ivan Flechais. 2023. Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households. 4643-4659. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/albayaydh"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2018.09.002"},{"key":"e_1_2_2_9_1","unstructured":"Peter Baeck and Sophie Reynolds. 2020. Using collective intelligence to address climate change. https:\/\/www.themj.co.uk\/Using-collective-intelligence-to-address-climate-change\/218184"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559383"},{"key":"e_1_2_2_14_1","unstructured":"Tim Berners-Lee Henry Story and Sarven Capadisli. 2022. Web Access Control. https:\/\/solid.github.io\/web-access-control-spec\/"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875498"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/AFIPS.1979.98"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_2_2_19_1","volume-title":"Comparative study of differentially private synthetic data algorithms from the NIST PSCR differential privacy synthetic data challenge. arXiv preprint arXiv:1911.12704","author":"McKay Bowen Claire","year":"2019","unstructured":"Claire McKay Bowen and Joshua Snoke. 2019. Comparative study of differentially private synthetic data algorithms from the NIST PSCR differential privacy synthetic data challenge. arXiv preprint arXiv:1911.12704 (2019)."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490390"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533406.3533424"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3570601"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/20319525231167981"},{"key":"e_1_2_2_24_1","unstructured":"P Calcraft I Thomas M Maglicic and A Sutherland. [n.d.]. Accelerating public policy research with synthetic data. https:\/\/www.adruk.org\/fileadmin\/uploads\/adruk\/Documents\/Accelerating_public_policy_research_with_synthetic_data_December_2021.pdf."},{"key":"e_1_2_2_25_1","volume-title":"Solid Protocol Version 0.9.0","author":"Capadisli Sarven","year":"2021","unstructured":"Sarven Capadisli, Tim Berners-Lee, Ruben Verborgh, and Kjetil Kjernsmo. 2021. Solid Protocol Version 0.9.0, 2021-12-17. https:\/\/solidproject.org\/TR\/protocol"},{"key":"e_1_2_2_26_1","volume-title":"elf Pavlik, and Dmitri Zagidulin","author":"Coburn Aaron","year":"2022","unstructured":"Aaron Coburn, elf Pavlik, and Dmitri Zagidulin. 2022. Solid-OIDC,. https:\/\/solidproject.org\/TR\/oidc."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00041-7"},{"key":"e_1_2_2_28_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_10"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"e_1_2_2_32_1","unstructured":"Judith Wagner DeCew. 1997. In Pursuit of Privacy: Law Ethics and the Rise of Technology . Cornell University Press."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12163"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_2_2_36_1","first-page":"1929","article-title":"On Algorithmic Wage Discrimination","volume":"123","author":"Dubal Veena","year":"2023","unstructured":"Veena Dubal. 2023. On Algorithmic Wage Discrimination. Columbia Law Review, Vol. 123, 7 (2023), 1929-1992. https:\/\/www.jstor.org\/stable\/27264954","journal-title":"Columbia Law Review"},{"key":"e_1_2_2_37_1","volume-title":"International colloquium on automata, languages, and programming","author":"Dwork Cynthia","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International colloquium on automata, languages, and programming. Springer, 1-12."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_2_40_1","unstructured":"Khaled El Emam Lucy Mosquera and Richard Hoptroff. 2020a. Practical Synthetic Data Generation : Balancing Privacy and the Broad Availability of Data . O'Reilly Beijing Boston Farnham Sebastopol Tokyo."},{"key":"e_1_2_2_41_1","volume-title":"Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data,. ''O'Reilly Media","author":"Emam Khaled El","unstructured":"Khaled El Emam, Lucy Mosquera, and Richard Hoptroff. 2020b. Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data,. ''O'Reilly Media, Inc.'', Beijing Boston Farnham Sebastopol Tokyo."},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512944"},{"key":"e_1_2_2_46_1","first-page":"2339","volume-title":"Proceedings of the 25th International Conference on Neural Information Processing Systems -","volume":"2","author":"Hardt Moritz","year":"2012","unstructured":"Moritz Hardt, Katrina Ligett, and Frank Mcsherry. 2012. A Simple and Practical Algorithm for Differentially Private Data Release. In Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'12). Curran Associates Inc., Red Hook, NY, USA, 2339-2347."},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650220910345"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610188"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858319"},{"key":"e_1_2_2_50_1","volume-title":"Differential privacy and machine learning: a survey and review. arXiv preprint arXiv:1412.7584","author":"Ji Zhanglong","year":"2014","unstructured":"Zhanglong Ji, Zachary C Lipton, and Charles Elkan. 2014. Differential privacy and machine learning: a survey and review. arXiv preprint arXiv:1412.7584 (2014)."},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","unstructured":"James Jordon Lukasz Szpruch Florimond Houssiau Mirko Bottarelli Giovanni Cherubin Carsten Maple Samuel N. Cohen and Adrian Weller. 2022a. Synthetic Data - What Why and How? arXiv:2205.03257 [cs] doi:10.48550\/arXiv.2205.03257.","DOI":"10.48550\/arXiv.2205.03257"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","unstructured":"James Jordon Lukasz Szpruch Florimond Houssiau Mirko Bottarelli Giovanni Cherubin Carsten Maple Samuel N. Cohen and Adrian Weller. 2022b. Synthetic Data - what why and how? doi:10.48550\/arXiv.2205.03257.","DOI":"10.48550\/arXiv.2205.03257"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_6"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3593978"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858402"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_2_2_60_1","first-page":"30","article-title":"Before and after GDPR: tracking in mobile apps","volume":"10","author":"Kollnig Konrad","year":"2021","unstructured":"Konrad Kollnig, Reuben Binns, Max Van Kleek, Ulrik Lyngs, Jun Zhao, Claudine Tinsman, and Nigel Shadbolt. 2021. Before and after GDPR: tracking in mobile apps. Internet Policy Review, Vol. 10, 4 (2021), 30.","journal-title":"Internet Policy Review"},{"key":"e_1_2_2_61_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Kone\u010dn\u1ef3 Jakub","year":"2016","unstructured":"Jakub Kone\u010dn\u1ef3, H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/99"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555625"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.02.002"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511958"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387108"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107026"},{"key":"e_1_2_2_68_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). http:\/\/cups.cs.cmu.edu\/soups\/2013\/trustbusters2013\/Sign_up_or_Give_up_Malheiros.pdf","author":"Malheiros Miguel","year":"2013","unstructured":"Miguel Malheiros and S\u00f6ren Preibusch. 2013. Sign-Up or Give-Up: Exploring User Drop-Out in Web Service Registration. In Symposium on Usable Privacy and Security (SOUPS). http:\/\/cups.cs.cmu.edu\/soups\/2013\/trustbusters2013\/Sign_up_or_Give_up_Malheiros.pdf"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890529"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_2_2_72_1","doi-asserted-by":"crossref","unstructured":"Frank McSherry and Kunal Talwar. 2007b. Mechanism Design via Differential Privacy. https:\/\/www.microsoft.com\/en-us\/research\/publication\/mechanism-design-via-differential-privacy\/","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/00936502221102101"},{"key":"e_1_2_2_74_1","first-page":"190","volume-title":"Proceedings of The Web Conference","author":"Meurisch Christian","year":"2020","unstructured":"Christian Meurisch, Bekir Bayrak, and Max M\u00fchlh\u00e4user. 2020. Privacy-preserving AI services through data decentralization. In Proceedings of The Web Conference 2020. 190-200."},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3440754"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_2_2_77_1","volume-title":"Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking. 49-54","author":"Mortier Richard","year":"2016","unstructured":"Richard Mortier, Jianxin Zhao, Jon Crowcroft, Liang Wang, Qi Li, Hamed Haddadi, Yousef Amar, Andy Crabtree, James Colley, Tom Lodge, et al., 2016. Personal data management with the databox: What's inside the box?. In Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking. 49-54."},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_2_2_79_1","first-page":"119","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review, Vol. 79 (2004), 119. https:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/washlr79&id=129&div=&collection=","journal-title":"Washington Law Review"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_2_2_81_1","volume-title":"Foundations of cryptography","author":"Oded Goldreich","unstructured":"Goldreich Oded. 2009. Foundations of cryptography: volume 2, basic applications."},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.34"},{"key":"e_1_2_2_83_1","unstructured":"Open Data Institute and Projects by IF. 2022. Perceptions of ''Bottom-up Data Institutions'': A report on research findings and key learnings for ODI . Technical Report. Open Data Institute London."},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2489211"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"e_1_2_2_86_1","unstructured":"Michael O Rabin. 1981. How to exchange secrets with oblivious transfer. Technical Report. https:\/\/www.iacr.org\/museum\/rabin-obt\/obtrans-eprint187.pdf"},{"key":"e_1_2_2_87_1","volume-title":"Legislating Privacy: Technology, Social Values, and Public Policy","author":"Regan Priscilla M.","year":"1995","unstructured":"Priscilla M. Regan. 1995. Legislating Privacy: Technology, Social Values, and Public Policy,. University of North Carolina Press. https:\/\/www.jstor.org\/stable\/10.5149\/9780807864050_regan"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.01.001"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196023"},{"key":"e_1_2_2_90_1","unstructured":"Andrei Vlad Sambra Essam Mansour Sandro Hawke Maged Zereba Nicola Greco Abdurrahman Ghanem Dmitri Zagidulin Ashraf Aboulnaga and Tim Berners-Lee. 2016. Solid: a platform for decentralized social applications based on linked data. MIT CSAIL & Qatar Computing Research Institute Tech. Rep. (2016)."},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555755"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376662"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"e_1_2_2_95_1","first-page":"1451","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Stadler Theresa","year":"2022","unstructured":"Theresa Stadler, Bristena Oprisanu, and Carmela Troncoso. 2022. Synthetic data-anonymisation groundhog day. In 31st USENIX Security Symposium (USENIX Security 22). 1451-1468."},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581114"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533196"},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2005.12273"},{"key":"e_1_2_2_99_1","unstructured":"Virginia Balseiro Timea Turdean and Jeff Zucker. 2022. Solid WebID Profile. https:\/\/solid.github.io\/webid-profile\/"},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3139989"},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339474"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_2_2_103_1","volume-title":"Foundations of computer science","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In Foundations of computer science, 1986., 27th annual symposium on. 162-167."},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479535"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501866"},{"key":"e_1_2_2_106_1","volume-title":"Max Van Kleek, and Nigel Shadbolt","author":"Zhao Jun","year":"2016","unstructured":"Jun Zhao, Reuben Binns, Max Van Kleek, and Nigel Shadbolt. 2016. Privacy Languages: Are we there yet to enable user controls?. In Proceedings of the 25th International Conference Companion on World Wide Web (WWW '16 Companion, ). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 799-806. hrefhttps:\/\/doi.org\/10\/gmbqwndoi:10\/gmbqwn."},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479604"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645631"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394529"},{"key":"e_1_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610083"},{"key":"e_1_2_2_112_1","volume-title":"The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama's books of","author":"Zuboff Shoshana","year":"2019","unstructured":"Shoshana Zuboff. 2019. The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama's books of 2019. Profile books."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:47:22Z","timestamp":1760636842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":112,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757490"],"URL":"https:\/\/doi.org\/10.1145\/3757490","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}