!. Element-aggregatescope, Any?)> 13 <!ELEMENT PurposeScope(CommercialUse?, Any?)> 14 <!ELEMENT MonetizationScope(Level?, Any?)> 15, 16 ]> Listing 4.2: XML DTD Definition of Condition

G. Billington, D. Governatori, G. Maher, and M. J. , Another important evolution is to involve end-users in the evaluation of the proposed visualization tools in order to ensure their usabilityRepresentation Results for Defeasible Logic, Bibliography Antoniou, ACM Trans. Comput. Logic, vol.2, issue.2, pp.255-287, 2001.

G. Antoniou, N. Dimaresis, and G. Governatori, A modal and deontic defeasible reasoning system for modelling policies and multi-agent systems, Expert Systems with Applications, vol.36, issue.2, pp.4125-4134, 2009.
DOI : 10.1016/j.eswa.2008.03.009

L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, Access control in publish/subscribe systems, Proceedings of the second international conference on Distributed event-based systems, DEBS '08, pp.23-34, 2008.
DOI : 10.1145/1385989.1385993

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.1399

C. Balakrishna, Enabling Technologies for Smart City Services and Applications, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies, pp.223-227, 2012.
DOI : 10.1109/NGMAST.2012.51

URL : http://repository.edgehill.ac.uk/5224/1/I-TAS-12.pdf

A. Barki, A. Bouabdallah, S. Gharout, and J. Traoré, M2M Security: Challenges and Solutions, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1241-1254, 2015.
DOI : 10.1109/COMST.2016.2515516

URL : https://hal.archives-ouvertes.fr/hal-01236511

C. Benevolo, R. P. Dameri, and B. Auria, Smart mobility in smart city, in 'Empowering Organizations, pp.13-28, 2016.

T. Berners-lee, Linked Data, International Journal on Semantic Web and Information Systems', vol.4, p.3, 2006.

C. Bizer, T. , H. Berners-lee, and T. , Linked Data - The Story So Far, International Journal on Semantic Web and Information Systems, vol.5, issue.3, 2009.
DOI : 10.4018/jswis.2009081901

D. Buhalis and A. Amaranggana, Smart tourism destinations, in 'Information and communication technologies in tourism 2014, pp.553-564, 2013.

E. Cabrio, A. P. Aprosio, and S. Villata, These are your rights, in 'European Semantic Web Conference, pp.255-269, 2014.

A. Caragliu, D. Bo, C. Nijkamp, and P. , Smart Cities in Europe, Journal of Urban Technology, vol.2, issue.2, pp.65-82, 2011.
DOI : 10.1162/rest.88.2.324

D. Christin, Privacy in mobile participatory sensing: Current trends and future challenges, Journal of Systems and Software, vol.116, pp.57-68, 2016.
DOI : 10.1016/j.jss.2015.03.067

M. Compton, P. Barnaghi, L. Bermudez, R. García-castro, O. Corcho et al., The SSN ontology of the W3C semantic sensor network incubator group, Web Semantics: Science, Services and Agents on the World Wide Web, pp.25-32, 2012.
DOI : 10.1016/j.websem.2012.05.003

M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001.
DOI : 10.1145/373256.373258

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1109/2.485845

URL : https://hal.archives-ouvertes.fr/hal-01207773

D. F. Ferraiolo and D. R. Kuhn, Role-based access controls', arXiv preprint, 2009.

R. T. Fielding, Architectural styles and the design of network-based software architectures, 2000.

B. Fung, K. Wang, R. Chen, and P. S. Yu, Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, p.14, 2010.
DOI : 10.1145/1749603.1749605

D. V. Gibson, G. Kozmetsky, and R. W. Smilor, The technopolis phenomenon: Smart cities, fast systems, global networks, 1992.

T. F. Gordon, Analyzing open source license compatibility issues with Carneades, Proceedings of the 13th International Conference on Artificial Intelligence and Law, ICAIL '11, pp.51-55, 2011.
DOI : 10.1145/2018358.2018364

G. Governatori and A. Rotolo, BIO logical agents: Norms, beliefs, intentions in defeasible logic, Autonomous Agents and Multi-Agent Systems, vol.82, issue.4, pp.36-69, 2008.
DOI : 10.1111/j.1475-4975.1987.tb00540.x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.9957

G. Governatori, A. Rotolo, S. Villata, and F. Gandon, One License to Compose Them All, in 'The Semantic Web?ISWC 2013, pp.151-166, 2013.

J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, vol.29, issue.7, pp.1645-1660, 2013.
DOI : 10.1016/j.future.2013.01.010

C. Hanson, L. Kagal, T. Berners-lee, G. J. Sussman, and D. Weitzner, Data-purpose algebra: Modeling data usage policies, in 'Policies for Distributed Systems and Networks, pp.173-177, 2007.

O. Hartig, C. Bizer, and J. C. Freytag, Executing SPARQL queries over the web of linked data, in 'The Semantic Web-ISWC, pp.293-309, 2009.

T. Heath and C. Bizer, Linked data: Evolving the web into a global data space', Synthesis lectures on the semantic web: theory and technology, pp.1-136, 2011.

M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, A Policy Language for Distributed Usage Control, European Symposium on Research in Computer Security, pp.531-546, 2007.
DOI : 10.1007/978-3-540-74835-9_35

J. Hoepman, Privacy design strategies, in 'IFIP International Information Security Conference, pp.446-459, 2014.

J. Hollenbach, J. Presbrey, and T. Berners-lee, Using rdf metadata to enable access control on the social semantic web, Proceedings of the Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (CK2009), 2009.

I. Khan, F. Belqasmi, R. Glitho, N. Crespi, M. Morrow et al., Wireless sensor network virtualization: early architecture and research perspectives, IEEE Network, vol.29, issue.3, pp.104-112, 2015.
DOI : 10.1109/MNET.2015.7113233

URL : https://hal.archives-ouvertes.fr/hal-01273905

&. Polakos and P. , A data annotation architecture for semantic applications in virtualized wireless sensor networks, '2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)', IEEE, pp.27-35, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01273909

R. Khatoun and S. Zeadally, Smart cities, Communications of the ACM, vol.59, issue.8, pp.46-57, 2016.
DOI : 10.1145/2661704.2661713

E. Kontopoulos, N. Bassiliades, and G. Antoniou, Deploying defeasible logic rule bases for the semantic web, Data & Knowledge Engineering, vol.66, issue.1, pp.116-146, 2008.
DOI : 10.1016/j.datak.2008.02.005

E. Kontopoulos, N. Bassiliades, and G. Antoniou, Visualizing Semantic Web proofs of defeasible logic in the DR-DEVICE system, Knowledge-Based Systems, vol.24, issue.3, pp.406-419, 2011.
DOI : 10.1016/j.knosys.2010.12.001

M. Krötzsch and S. Speiser, Sharealike your data: Self-referential usage policies for the semantic web, in 'International Semantic Web Conference, pp.354-369, 2011.

A. Kung, Pears: privacy enhancing architectures, in 'Annual Privacy Forum, pp.18-29, 2014.

A. Kung, J. Freytag, and F. Kargl, Privacy-by-design in ITS applications, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp.1-6, 2011.
DOI : 10.1109/WoWMoM.2011.5986166

H. Lam and G. Governatori, The making of SPINdle, in 'Rule Interchange and Applications, pp.315-322, 2009.

B. W. Lampson, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

G. C. Lazaroiu and M. Roscia, Definition methodology for the smart cities model, Energy, vol.47, issue.1, pp.326-332, 2012.
DOI : 10.1016/j.energy.2012.09.028

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010.
DOI : 10.1016/j.cosrev.2010.02.002

L. Métayer and D. , Whom to trust? using technology to enforce privacy, in 'Enforcing Privacy, pp.395-437, 2016.

S. B. Letaifa, How to strategize smart cities: Revealing the SMART model, Journal of Business Research, vol.68, issue.7, pp.1414-1419, 2015.
DOI : 10.1016/j.jbusres.2015.01.024

G. Lu, Neural Trust Model for Multi-agent Systems, 2011.

J. Manyika, M. Chui, P. Bisson, J. Woetzel, R. Dobbs et al., Unlocking the potential of the internet of things', McKinsey Global Institute http, 2015.

D. Miorandi, S. Sicari, F. De-pellegrini, and I. Chlamtac, Internet of things: Vision, applications and research challenges, Ad Hoc Networks, pp.1497-1516, 2012.
DOI : 10.1016/j.adhoc.2012.02.016

N. Nadah, M. D. De-rosnay, and B. Bachimont, Licensing digital content with a generic ontology, Proceedings of the 11th international conference on Artificial intelligence and law, ICAIL '07, pp.65-69, 2007.
DOI : 10.1145/1276318.1276330

URL : https://hal.archives-ouvertes.fr/halshs-00631605

T. Nam and T. A. Pardo, Conceptualizing smart city with dimensions of technology, people, and institutions, Proceedings of the 12th Annual International Digital Government Research Conference on Digital Government Innovation in Challenging Times, dg.o '11, pp.282-291, 2011.
DOI : 10.1145/2037556.2037602

J. Park and R. Sandhu, Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002.
DOI : 10.1145/507711.507722

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.4350

J. Park, R. Sandhu, and K. A. , usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-405, 2004.
DOI : 10.1145/984334.984339

J. Pato, S. Paradesi, I. Jacobi, F. Shih, and S. Wang, Aintno: Demonstration of Information Accountability on the Web, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, pp.1072-1080, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.29

A. Pretschner, M. Hilty, D. Basin, C. Schaefer, and T. Walter, Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-244, 2008.
DOI : 10.1145/1368310.1368344

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.676.3030&rep=rep1&type=pdf

A. Pretschner, M. Hilty, S. Florian, C. Schaefer, and T. Walter, Usage Control Enforcement: Present and Future, IEEE Security & Privacy Magazine, vol.6, issue.4, pp.44-53, 2008.
DOI : 10.1109/MSP.2008.101

A. Pretschner and T. Walter, Negotiation of usage control policiessimply the best?, in 'Availability, Reliability and Security, ARES 08. Third International Conference on', IEEE, pp.1135-1136, 2008.

R. Pucella and V. Weissman, A logic for reasoning about digital rights, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.282-294, 2002.
DOI : 10.1109/CSFW.2002.1021822

A. Rotolo, S. Villata, and F. Gandon, A deontic logic semantics for licenses composition in the web of data, Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law, ICAIL '13, pp.111-120, 2013.
DOI : 10.1145/2514601.2514614

URL : https://hal.archives-ouvertes.fr/hal-00907879

L. Sanchez, L. Muñoz, J. A. Galache, P. Sotres, J. R. Santana et al., SmartSantander: IoT experimentation over a smart city testbed, Computer Networks, vol.61, pp.61-217, 2014.
DOI : 10.1016/j.bjp.2013.12.020

URL : https://repositorio.unican.es/xmlui/bitstream/10902/9926/3/SmartSantanderIoT.pdf

R. S. Sandhu, E. J. Coynek, H. L. Feinsteink, and C. E. Youmank, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867

H. Schaffers, N. Komninos, M. Pallot, B. Trousse, M. Nilsson et al., Smart cities and the future internet Towards cooperation frameworks for open innovation, in 'The Future Internet Assembly, pp.431-446, 2011.

G. Schiele, J. Soldatos, and N. Mitton, Moving towards interoperable internet-of-things deployments in smart cities, p.16, 2014.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-porisini, Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, vol.76, pp.146-164, 2015.
DOI : 10.1016/j.comnet.2014.11.008

S. Speiser and A. Harth, Data-centric privacy policies for smart grids, in '2012 AAAI Workshop? Semantic Cities, pp.31-36, 2012.

S. Speiser, A. Wagner, O. Raabe, and A. Harth, Web technologies and privacy policies for the smart grid, in 'Policies for Distributed Systems and Networks (POLICY), IEEE International Symposium on', IEEE, pp.121-124, 2011.

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, A semantic context-aware access control framework for secure collaborations in pervasive computing environments, in 'International semantic web conference, pp.473-486, 2006.

A. M. Townsend, Smart cities: Big data, civic hackers, and the quest for a new utopia, 2013.

N. B. Truong, T. Um, and G. M. Lee, A reputation and knowledge based trust service platform for trustworthy social internet of things', Innovations in Clouds, Internet and Networks (ICIN), 2016.

T. Um, G. M. Lee, and J. K. Choi, Strengthening trust in the future social-cyber-physical infrastructure: an ITU-T perspective, IEEE Communications Magazine, vol.54, issue.9, pp.36-42, 2016.
DOI : 10.1109/MCOM.2016.7565270

J. Wu, M. Dong, K. Ota, M. Tariq, and L. Guo, Cross-Domain Fine-Grained Data Usage Control Service for Industrial Wireless Sensor Networks, IEEE Access, vol.3, pp.2939-2949, 2015.
DOI : 10.1109/ACCESS.2015.2504541

URL : http://doi.org/10.1109/access.2015.2504541

Z. Yan, P. Zhang, and A. V. Vasilakos, A survey on trust management for Internet of Things, Journal of Network and Computer Applications, vol.42, pp.120-134, 2014.
DOI : 10.1016/j.jnca.2014.01.014

A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, Internet of Things for Smart Cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014.
DOI : 10.1109/JIOT.2014.2306328