Any?)> 13 <!ELEMENT PurposeScope(CommercialUse?, Any?)> 14 <!ELEMENT MonetizationScope(Level?, Any?)> 15, 16 ]> Listing 4.2: XML DTD Definition of Condition ,
Another important evolution is to involve end-users in the evaluation of the proposed visualization tools in order to ensure their usabilityRepresentation Results for Defeasible Logic, Bibliography Antoniou, ACM Trans. Comput. Logic, vol.2, issue.2, pp.255-287, 2001. ,
A modal and deontic defeasible reasoning system for modelling policies and multi-agent systems, Expert Systems with Applications, vol.36, issue.2, pp.4125-4134, 2009. ,
DOI : 10.1016/j.eswa.2008.03.009
The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
DOI : 10.1016/j.comnet.2010.05.010
Access control in publish/subscribe systems, Proceedings of the second international conference on Distributed event-based systems, DEBS '08, pp.23-34, 2008. ,
DOI : 10.1145/1385989.1385993
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.1399
Enabling Technologies for Smart City Services and Applications, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies, pp.223-227, 2012. ,
DOI : 10.1109/NGMAST.2012.51
URL : http://repository.edgehill.ac.uk/5224/1/I-TAS-12.pdf
M2M Security: Challenges and Solutions, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1241-1254, 2015. ,
DOI : 10.1109/COMST.2016.2515516
URL : https://hal.archives-ouvertes.fr/hal-01236511
Smart mobility in smart city, in 'Empowering Organizations, pp.13-28, 2016. ,
Linked Data, International Journal on Semantic Web and Information Systems', vol.4, p.3, 2006. ,
Linked Data - The Story So Far, International Journal on Semantic Web and Information Systems, vol.5, issue.3, 2009. ,
DOI : 10.4018/jswis.2009081901
Smart tourism destinations, in 'Information and communication technologies in tourism 2014, pp.553-564, 2013. ,
These are your rights, in 'European Semantic Web Conference, pp.255-269, 2014. ,
Smart Cities in Europe, Journal of Urban Technology, vol.2, issue.2, pp.65-82, 2011. ,
DOI : 10.1162/rest.88.2.324
Privacy in mobile participatory sensing: Current trends and future challenges, Journal of Systems and Software, vol.116, pp.57-68, 2016. ,
DOI : 10.1016/j.jss.2015.03.067
The SSN ontology of the W3C semantic sensor network incubator group, Web Semantics: Science, Services and Agents on the World Wide Web, pp.25-32, 2012. ,
DOI : 10.1016/j.websem.2012.05.003
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001. ,
DOI : 10.1145/373256.373258
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1109/2.485845
URL : https://hal.archives-ouvertes.fr/hal-01207773
Role-based access controls', arXiv preprint, 2009. ,
Architectural styles and the design of network-based software architectures, 2000. ,
Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, p.14, 2010. ,
DOI : 10.1145/1749603.1749605
The technopolis phenomenon: Smart cities, fast systems, global networks, 1992. ,
Analyzing open source license compatibility issues with Carneades, Proceedings of the 13th International Conference on Artificial Intelligence and Law, ICAIL '11, pp.51-55, 2011. ,
DOI : 10.1145/2018358.2018364
BIO logical agents: Norms, beliefs, intentions in defeasible logic, Autonomous Agents and Multi-Agent Systems, vol.82, issue.4, pp.36-69, 2008. ,
DOI : 10.1111/j.1475-4975.1987.tb00540.x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.9957
One License to Compose Them All, in 'The Semantic Web?ISWC 2013, pp.151-166, 2013. ,
Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, vol.29, issue.7, pp.1645-1660, 2013. ,
DOI : 10.1016/j.future.2013.01.010
Data-purpose algebra: Modeling data usage policies, in 'Policies for Distributed Systems and Networks, pp.173-177, 2007. ,
Executing SPARQL queries over the web of linked data, in 'The Semantic Web-ISWC, pp.293-309, 2009. ,
Linked data: Evolving the web into a global data space', Synthesis lectures on the semantic web: theory and technology, pp.1-136, 2011. ,
A Policy Language for Distributed Usage Control, European Symposium on Research in Computer Security, pp.531-546, 2007. ,
DOI : 10.1007/978-3-540-74835-9_35
Privacy design strategies, in 'IFIP International Information Security Conference, pp.446-459, 2014. ,
Using rdf metadata to enable access control on the social semantic web, Proceedings of the Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (CK2009), 2009. ,
Wireless sensor network virtualization: early architecture and research perspectives, IEEE Network, vol.29, issue.3, pp.104-112, 2015. ,
DOI : 10.1109/MNET.2015.7113233
URL : https://hal.archives-ouvertes.fr/hal-01273905
A data annotation architecture for semantic applications in virtualized wireless sensor networks, '2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)', IEEE, pp.27-35, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01273909
Smart cities, Communications of the ACM, vol.59, issue.8, pp.46-57, 2016. ,
DOI : 10.1145/2661704.2661713
Deploying defeasible logic rule bases for the semantic web, Data & Knowledge Engineering, vol.66, issue.1, pp.116-146, 2008. ,
DOI : 10.1016/j.datak.2008.02.005
Visualizing Semantic Web proofs of defeasible logic in the DR-DEVICE system, Knowledge-Based Systems, vol.24, issue.3, pp.406-419, 2011. ,
DOI : 10.1016/j.knosys.2010.12.001
Sharealike your data: Self-referential usage policies for the semantic web, in 'International Semantic Web Conference, pp.354-369, 2011. ,
Pears: privacy enhancing architectures, in 'Annual Privacy Forum, pp.18-29, 2014. ,
Privacy-by-design in ITS applications, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp.1-6, 2011. ,
DOI : 10.1109/WoWMoM.2011.5986166
The making of SPINdle, in 'Rule Interchange and Applications, pp.315-322, 2009. ,
Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974. ,
DOI : 10.1145/775265.775268
Definition methodology for the smart cities model, Energy, vol.47, issue.1, pp.326-332, 2012. ,
DOI : 10.1016/j.energy.2012.09.028
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010. ,
DOI : 10.1016/j.cosrev.2010.02.002
Whom to trust? using technology to enforce privacy, in 'Enforcing Privacy, pp.395-437, 2016. ,
How to strategize smart cities: Revealing the SMART model, Journal of Business Research, vol.68, issue.7, pp.1414-1419, 2015. ,
DOI : 10.1016/j.jbusres.2015.01.024
Neural Trust Model for Multi-agent Systems, 2011. ,
Unlocking the potential of the internet of things', McKinsey Global Institute http, 2015. ,
Internet of things: Vision, applications and research challenges, Ad Hoc Networks, pp.1497-1516, 2012. ,
DOI : 10.1016/j.adhoc.2012.02.016
Licensing digital content with a generic ontology, Proceedings of the 11th international conference on Artificial intelligence and law, ICAIL '07, pp.65-69, 2007. ,
DOI : 10.1145/1276318.1276330
URL : https://hal.archives-ouvertes.fr/halshs-00631605
Conceptualizing smart city with dimensions of technology, people, and institutions, Proceedings of the 12th Annual International Digital Government Research Conference on Digital Government Innovation in Challenging Times, dg.o '11, pp.282-291, 2011. ,
DOI : 10.1145/2037556.2037602
Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002. ,
DOI : 10.1145/507711.507722
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.4350
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-405, 2004. ,
DOI : 10.1145/984334.984339
Aintno: Demonstration of Information Accountability on the Web, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, pp.1072-1080, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.29
Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-244, 2008. ,
DOI : 10.1145/1368310.1368344
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.676.3030&rep=rep1&type=pdf
Usage Control Enforcement: Present and Future, IEEE Security & Privacy Magazine, vol.6, issue.4, pp.44-53, 2008. ,
DOI : 10.1109/MSP.2008.101
Negotiation of usage control policiessimply the best?, in 'Availability, Reliability and Security, ARES 08. Third International Conference on', IEEE, pp.1135-1136, 2008. ,
A logic for reasoning about digital rights, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.282-294, 2002. ,
DOI : 10.1109/CSFW.2002.1021822
A deontic logic semantics for licenses composition in the web of data, Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law, ICAIL '13, pp.111-120, 2013. ,
DOI : 10.1145/2514601.2514614
URL : https://hal.archives-ouvertes.fr/hal-00907879
SmartSantander: IoT experimentation over a smart city testbed, Computer Networks, vol.61, pp.61-217, 2014. ,
DOI : 10.1016/j.bjp.2013.12.020
URL : https://repositorio.unican.es/xmlui/bitstream/10902/9926/3/SmartSantanderIoT.pdf
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
Smart cities and the future internet Towards cooperation frameworks for open innovation, in 'The Future Internet Assembly, pp.431-446, 2011. ,
Moving towards interoperable internet-of-things deployments in smart cities, p.16, 2014. ,
Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, vol.76, pp.146-164, 2015. ,
DOI : 10.1016/j.comnet.2014.11.008
Data-centric privacy policies for smart grids, in '2012 AAAI Workshop? Semantic Cities, pp.31-36, 2012. ,
Web technologies and privacy policies for the smart grid, in 'Policies for Distributed Systems and Networks (POLICY), IEEE International Symposium on', IEEE, pp.121-124, 2011. ,
A semantic context-aware access control framework for secure collaborations in pervasive computing environments, in 'International semantic web conference, pp.473-486, 2006. ,
Smart cities: Big data, civic hackers, and the quest for a new utopia, 2013. ,
A reputation and knowledge based trust service platform for trustworthy social internet of things', Innovations in Clouds, Internet and Networks (ICIN), 2016. ,
Strengthening trust in the future social-cyber-physical infrastructure: an ITU-T perspective, IEEE Communications Magazine, vol.54, issue.9, pp.36-42, 2016. ,
DOI : 10.1109/MCOM.2016.7565270
Cross-Domain Fine-Grained Data Usage Control Service for Industrial Wireless Sensor Networks, IEEE Access, vol.3, pp.2939-2949, 2015. ,
DOI : 10.1109/ACCESS.2015.2504541
URL : http://doi.org/10.1109/access.2015.2504541
A survey on trust management for Internet of Things, Journal of Network and Computer Applications, vol.42, pp.120-134, 2014. ,
DOI : 10.1016/j.jnca.2014.01.014
Internet of Things for Smart Cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014. ,
DOI : 10.1109/JIOT.2014.2306328