ACKNOWLEDGEMENTS
This research is funded by the European Union’s
Horizon 2020 research and innovation programme
under grant agreement N. 731601.
REFERENCES
Acquisti, A., Adjerid, I., and Brandimarte, L. (2013). Gone
in 15 seconds: The limits of privacy transparency and
control. IEEE Security & Privacy, 11(4).
Agarwal, S., Steyskal, S., Antunovic, F., and Kirrane, S.
(2018). Legislative compliance assessment: Frame-
work, model and GDPR instantiation. In Annual Pri-
vacy Forum.
Artz, D. and Gil, Y. (2007). A survey of trust in computer
science and the Semantic Web. Web Semantics, 5(2).
Athan, T., Boley, H., Governatori, G., Palmirani, M.,
Paschke, A., and Wyner, A. Z. (2013). Oasis Legal-
RuleML. In ICAIL, volume 13.
Azzedin, F. and Maheswaran, M. (2002). Evolving and
managing trust in grid computing systems. In IEEE
CCECE. Canadian Conference on Electrical and
Computer Engineering., volume 3.
Backes, M., Lorenz, S., Maffei, M., and Pecina, K. (2010).
Anonymous webs of trust. Lecture Notes in Computer
Science (including subseries Lecture Notes in Artifi-
cial Intelligence and Lecture Notes in Bioinformatics).
Bartolini, C., Muthuri, R., and Santos, C. (2015). Using
ontologies to model data protection requirements in
workflows. In JSAI International Symposium on Arti-
ficial Intelligence.
Beiter, M., Mont, M. C., Chen, L., and Pearson, S. (2014).
End-to-end policy based encryption techniques for
multi-party data management. Computer Standards
& Interfaces, 36(4).
Bellare, M. and Yee, B. (1997). Forward integrity for se-
cure audit logs. Technical report, Technical report,
Computer Science and Engineering Department, Uni-
versity of California at San Diego.
Boer, A., Winkels, R., and Vitali, F. (2008). Metalex XML
and the legal knowledge interchange format. In Com-
putable models of the law.
Bonatti, P., Duma, C., Olmedilla, D., and Shahmehri, N.
(2005). An integration of reputation-based and policy-
based trust management. In Semantic Web Policy
Workshop.
Bonatti, P., Kirrane, S., Polleres, A., and Wenning, R.
(2017). Transparent personal data processing: The
road ahead. In International Conference on Computer
Safety, Reliability, and Security.
Bonatti, P. A. and Kirrane, S. (2019). Big data and analytics
in the age of the GDPR. In 2019 IEEE International
Congress on Big Data (BigDataCongress).
Bonatti, P. A. and Olmedilla, D. (2007). Rule-based pol-
icy representation and reasoning for the semantic web.
In Proceedings of the Third International Summer
School Conference on Reasoning Web.
Capadisli, S., Guy, A., Lange, C., Auer, S., Sambra, A.,
and Berners-Lee, T. (2017). Linked data notifications:
a resource-centric communication protocol. In Euro-
pean Semantic Web Conference.
Cofta, P. L. (2018). Trust and the web – A decline or a
revival? Journal of Web Engineering, 17(8).
De Vos, M., Kirrane, S., Padget, J., and Satoh, K. (2019).
ODRL policy modelling and compliance checking. In
RuleML+RR.
Golbeck, J. (2006). Trust on the world wide web: A survey.
Foundations and Trends in Web Science, 1(2).
Hendler, J. and Golbeck, J. (2008). Metcalfe’s law, web
2.0, and the semantic web. Web Semantics: Science,
Services and Agents on the World Wide Web, 6(1).
Information Commissioner’s Office (ICO) UK (2017). Get-
ting ready for the GDPR.
Jøsang, A., Ismail, R., and Boyd, C. (2007). A survey of
trust and reputation systems for online service provi-
sion. Decision support systems, 43(2).
Kagal, L., Finin, T., and Joshi, A. (2003). A policy based
approach to security for the semantic web. In The Se-
mantic Web - ISWC 2003.
McDonald, A. M. and Cranor, L. F. (2008). The cost of
reading privacy policies. ISJLP, 4.
Microsoft Trust Center (2017). Detailed GDPR Assess-
ment.
Mitchell, C. (2005). Trusted computing, volume 6. IET.
Nymity (2017). GDPR Compliance Toolkit.
Oppliger, R. and Rytz, R. (2005). Does trusted computing
remedy computer security problems? IEEE Security
& Privacy, 3(2).
Palmirani, M., Governatori, G., Rotolo, A., Tabet, S., Bo-
ley, H., and Paschke, A. (2011). LegalRuleML: XML-
based rules and norms. In Workshop on Rules and
Rule Markup Languages for the Semantic Web.
Pandit, H. J., Fatema, K., O’Sullivan, D., and Lewis, D.
(2018). GDPRtEXT-GDPR as a linked data resource.
In European Semantic Web Conference.
Pinyol, I. and Sabater-Mir, J. (2013). Computational trust
and reputation models for open multi-agent systems:
A review. Artificial Intelligence Review, 40(1).
Pulls, T., Peeters, R., and Wouters, K. (2013). Distributed
privacy-preserving transparency logging. In Proceed-
ings of the 12th ACM workshop on Workshop on pri-
vacy in the electronic society.
Sackmann, S., Str
¨
uker, J., and Accorsi, R. (2006). Person-
alization in privacy-aware highly dynamic systems.
Communications of the ACM, 49(9).
Sambra, A. V., Mansour, E., Hawke, S., Zereba, M., Greco,
N., Ghanem, A., Zagidulin, D., Aboulnaga, A., and
Berners-Lee, T. (2016). Solid: A platform for decen-
tralized social applications based on linked data.
Tang, Q. (2008). On using encryption techniques to en-
hance sticky policies enforcement. DIES, Faculty of
EEMCS, University of Twente, The Netherlands.
Wahab, O. A., Bentahar, J., Otrok, H., and Mourad, A.
(2015). A survey on trust and reputation models for
Web services: Single, composite, and communities.
Decision Support Systems, 74.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
662