<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An open-source platform for Resilient Secure Digital Identities: The RECITALS project</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>George Stamoulis</string-name>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dimitris Pavlou</string-name>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Konstantinos Chousos</string-name>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manolis Koubarakis</string-name>
          <email>koubarak@di.uoa.gr</email>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>George Papadakis</string-name>
          <email>g_a.papadakis@ppcgroup.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christina Papapostolou</string-name>
          <email>c.papapostolou@ppcgroup.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Georgios Smaragdakis</string-name>
          <email>g.smaragdakis@tudelft.nl</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Zekeriya Erkin</string-name>
          <email>z.erkin@tudelft.nl</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roland Kromes</string-name>
          <email>R.G.Kromes@tudelft.nl</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Themis Palpanas</string-name>
          <email>themis@mi.parisdescartes.fr</email>
          <xref ref-type="aff" rid="aff9">9</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Salima Benbernou</string-name>
          <email>salima.benbernou@u-paris.fr</email>
          <xref ref-type="aff" rid="aff9">9</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mourad Ouziri</string-name>
          <email>mourad.ouzri@u-paris.fr</email>
          <xref ref-type="aff" rid="aff9">9</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adel Boubetra</string-name>
          <email>adelarte.ab@gmail.com</email>
          <xref ref-type="aff" rid="aff9">9</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paulo Correia</string-name>
          <email>paulo.correia@pdmfc.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>João Pedro</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ioan Constantin</string-name>
          <email>ioan.constantin@orange.com</email>
          <xref ref-type="aff" rid="aff6">6</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Laurentiu Coica</string-name>
          <email>laurentiu.coica@orange.com</email>
          <xref ref-type="aff" rid="aff6">6</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Fisichella</string-name>
          <email>mfisichella@l3s.de</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Apoorva Upadhyaya</string-name>
          <email>upadhyaya@l3s.de</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Harshvardhan Pandit</string-name>
          <email>harshvardhan.pandit@adaptcentre.ie</email>
          <xref ref-type="aff" rid="aff8">8</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kyriakos Dimitriou</string-name>
          <email>k.dimitriou@cetri.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Center for Technology Research and Innovation</institution>
          ,
          <country country="CY">Cyprus</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Delft University of Technology</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Dimosia Epicheirisi Ilektrismou Anonymi Etaireia</institution>
          ,
          <country country="GR">Greece</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Hospital Do Espirito Santo de Evora EPE</institution>
          ,
          <country country="PT">Portugal</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Leibniz University of Hannover</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>National and Kapodistrian University of Athens</institution>
          ,
          <country country="GR">Greece</country>
        </aff>
        <aff id="aff6">
          <label>6</label>
          <institution>Orange Romania SA</institution>
          ,
          <country country="RO">Romania</country>
        </aff>
        <aff id="aff7">
          <label>7</label>
          <institution>RR'25: Companion Proceedings of the 9th International Joint Conference on Rules and Reasoning</institution>
        </aff>
        <aff id="aff8">
          <label>8</label>
          <institution>Trinity College Dublin</institution>
          ,
          <country country="IE">Ireland</country>
        </aff>
        <aff id="aff9">
          <label>9</label>
          <institution>Université Paris Cité</institution>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The RECITALS project is a three-year Horizon Europe Innovation Action that pioneers the development of a privacy-by-design, open-source platform for secure digital identity and data sharing. By integrating logic-based reasoning for compliance automation, explainable AI, and privacy-preserving technologies, RECITALS advances legal, secure, and transparent data exploitation across sectors. It leverages a Knowledge Graph approach combined with logic-based reasoning to ensure that decisions regarding identity lifecycle management and data governance are aligned with European regulations such as GDPR, eIDAS, NIS2, and the AI Act. Central to RECITALS is the implementation of self-sovereign identity solutions that place control in the hands of the user, enhanced by compliance and explainability mechanisms. The platform's deployment in real-world use cases -- from the energy, telecommunications, and healthcare sector - demonstrates its ability to reason over complex policies, explain automated decisions, and enforce compliance through interoperable infrastructures. RECITALS started on January, 2025 and will be concluded on December 2027, bringing together a consortium of 10 partners from 8 EU countries, with the aim of delivering a comprehensive open-source platform for resilient secure digital identities.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Open-Source Platform</kwd>
        <kwd>Privacy-Preserving Technologies</kwd>
        <kwd>Self-Sovereign Identity</kwd>
        <kwd>Identity Lifecycle Management</kwd>
        <kwd>Data Protection Compliance</kwd>
        <kwd>Secure Data Sharing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The RECITALS project1 stands at the forefront of advancing and implementing cutting-edge
privacypreserving technologies aimed at enabling secure and legally compliant data exploitation. It incorporates
a suite of state-of-the-art tools, including cryptographic anonymous credentials, homomorphic
encryption, secure multiparty computation, and diferential privacy [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Its innovation lies not only in its
technical components, but also in its deliberate integration of logic-based reasoning techniques for
compliance checks and decision explainability into every layer of the platform. One of the project’s key
diferentiators is its Compliance Manager, which utilizes a Knowledge Graph approach combined with
logic-based reasoning techniques [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. This component interprets and enforces compliance
requirements—such as GDPR, NIS2, and the AI Act—using a framework that enables dynamic, transparent,
and verifiable decision-making.
      </p>
      <p>
        RECITALS underscores the paramount significance of trusted digital identities, aligned with the
European eID and forthcoming eIDAS regulations [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The project promotes the development of
selfsovereign identity solutions that grant users full autonomy over their personal data and its usage. These
user-centric digital identities are key to fostering trust across digital ecosystems [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Moreover, the
project prioritizes usability, scalability, and the seamless integration of privacy-preserving technologies
into existing infrastructures, particularly within supply chain environments.
      </p>
      <p>
        RECITALS addresses the complexity of privacy-preserving data management across three use cases
with diverse organizational models in the energy, telecommunications, and healthcare sectors. The
proposed solutions are not only innovative but also practical, undergoing rigorous validation and pilot
testing in real-world, federated data infrastructures to ensure their efectiveness and adaptability. To
enhance user trust in AI-driven processes, RECITALS provides the explAIner component, a library
of state-of-the-art xAI methods [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] that enhance the transparency of its automatic processes, while
ensuring that they are not only compliant with EU regulations but also understandable, and user-centric.
      </p>
      <p>In this context, RECITALS aims to deliver a highly eficient and scalable open-source platform
tailored for both industrial and scientific applications that require privacy-preserving data sharing and
identity management. With a robust privacy-by-design architecture, the platform is engineered to resist
advanced and AI-driven cyber threats, comply with EU regulations, and provide value-added services
for a broad spectrum of use cases.</p>
      <p>In the following, we delve into the main objectives of RECITALS, the architecture of its open-source
platform and the partners comprising its consortium.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Main Objectives and Goals</title>
      <p>The RECITALS project is driven by a vision to enable secure, privacy-preserving, and
regulationcompliant data sharing and identity management across critical sectors. The primary goal of RECITALS
is to design an open-source, privacy-by-design platform that supports next-generation data sharing
and identity management. This platform is tailored for resilience and full compliance with evolving
European regulations, such as GDPR, NIS2, and the AI Act. RECITALS integrates fundamental but
common operations for privacy-preserving data sharing and identity management into modules that
facilitate the development of diverse applications through a library of state-of-the-art techniques. On
top of these modules, the project aims to develop advanced services that support industrial-strength
applications with automated compliance capabilities. These services are specifically designed to meet
the requirements of domain-specific EU regulations and ensure seamless deployment across varied
operational contexts. Special care is taken to identify and mitigate common and AI-powered threats
against these services through the cybersecurity component. This component protects the platform’s
core infrastructure as well as its value-added services, guaranteeing security across the data lifecycle.</p>
      <p>To validate these developments, RECITALS demonstrates the platform’s potential in real-world
business scenarios within the energy, telecommunications, and healthcare sectors. These use cases
are not only critical from a cybersecurity perspective but also serve to test the platform’s usability,
interoperability, and efectiveness in diverse data-sharing environments.</p>
      <p>RECITALS aligns with the European Commission’s Increased Cybersecurity Destination of the
Strategic Plan 2021–2024, contributing to enhanced data protection, network security, and technological
sovereignty across the EU. The project aims to achieve tangible impacts, including improved software,
hardware, and supply chain security, and the creation of a cybersecurity culture through interdisciplinary
collaboration and stakeholder engagement. RECITALS envisions a strengthened EU cybersecurity
posture and sovereignty in digital technologies. It promotes privacy-by-design architectures and
interoperable standards to ensure that infrastructures and processes remain resilient against emerging
threats. By aligning its goals with the European cybersecurity initiatives and engaging with a wide
range of stakeholders, RECITALS lays the foundation for smart and qualified security assurance and
certification that is shared across the EU.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The RECITALS Platform</title>
      <sec id="sec-3-1">
        <title>3.1. RECITALS Core</title>
        <p>
          This is the backbone of the RECITALS platform, with its modules providing the fundamental operations
that lay the ground for the more complex services. At its heart lies the Distributed Ledger, which
establishes a decentralized and immutable foundation for all transactions and records [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. This
component fosters trust among participants by providing transparency, ensuring data integrity through
tamper-proof immutability, and guaranteeing system resilience by avoiding a single point of failure.
Special attention is paid to supporting private ledgers for intra-organizational identity management
and hybrid ledgers for secure inter-organizational data exchanges.
        </p>
        <p>Complementing the ledger is the Identity Lifecycle Manager, which governs digital identities
throughout their entire lifecycle, from creation to deactivation. It ensures regulatory and organizational
compliance via audit and reporting functionalities and enforces policy alignment through automated
checks. Self-service capabilities empower users to manage their identities autonomously, while
administrative tools centralize control. Notifications and approval workflows enhance user engagement and
oversight, whereas built-in password and compliance management mechanisms mitigate security risks
and promote adherence to EU standards.</p>
        <p>Privacy and security are further strengthened through the Cryptography Manager, which incorporates
state-of-the-art techniques such as diferential privacy, homomorphic encryption, secure multi-party
computation, zero-knowledge proofs, and verifiable credentials. These tools enable secure
computations on encrypted data, privacy-preserving authentication, and trusted identity assertions without
compromising sensitive information.</p>
        <p>In parallel, the Anonymization Manager applies rigorous data anonymization algorithms (e.g.,
kanonymity, l-diversity, t-closeness) to manage controlled data publishing, limiting disclosure through
selective access and attribute generalization.</p>
        <p>
          Ensuring that all operations conform to legal and regulatory expectations, the Compliance Manager
leverages knowledge graphs and logic-based reasoning, drawing on prior EU projects. It extends beyond
GDPR to encompass emerging frameworks like the DGA and NIS2, supported by extensible vocabularies
such as the Data Privacy Vocabulary [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. It also automates key compliance checks, enforces security
principles such as confidentiality, integrity, and availability, and promotes trustworthy services aligned
with evolving regulatory landscapes across the EU Data Spaces.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. RECITALS Value-Added Services</title>
        <p>To operationalize and extend RECITALS into real-world applications, a range of Value-Added Services
will be developed on top of RECITALS Core. The main service is the intuitive user interface, which
supports natural language interactions through LLMs, i.e., ChatBots. The LLM-based Interface is powered
by a Retrieval-Augmented Generation framework, which ensures that outputs are grounded in factual
and updated documentation. Thus, it bypasses the limitations of static LLM training by dynamically
incorporating evolving RECITALS platform knowledge.</p>
        <p>The Self-Sovereign Wallet gives users complete control over their identities and data through
decentralized identifiers and verifiable credentials. This wallet enhances privacy and user autonomy while
ensuring interoperability and ease of use with the LLM-based Interface.</p>
        <p>
          The Privacy-Preserving Record Linkage enables secure identification of duplicate records across datasets
without revealing underlying sensitive data [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. This is achieved by transforming identifiers into
encrypted or obfuscated formats and by leveraging cryptographic methods such as secure multi-party
computation to perform record linkage in a privacy-preserving manner.
        </p>
        <p>
          The Privacy-Preserving Federated Learning facilitates collaborative model training without
centralizing data [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. It supports techniques like federated averaging, knowledge distillation, and federated
reinforcement learning, allowing users to jointly improve models while safeguarding data privacy.
        </p>
        <p>Transparency in automated decisions is achieved through the explAIner component, which integrates
explainable AI techniques such as Local Interpretable Model-agnostic Explanations, SHapley Additive
exPlanations, Partial Dependence Plots, and Individual Conditional Expectation. These tools provide
post-hoc interpretations of model behavior, supporting compliance with transparency mandates and
enhancing user trust.</p>
        <p>Domain-specific compliance is addressed through an extension of the Compliance Manager, targeting
the energy, telecommunications, and healthcare sectors. This extension adapts the core compliance
infrastructure with tailored vocabularies and validation rules for domain-specific use cases, facilitating
operational deployment and reducing compliance overhead.</p>
        <p>
          Finally, Privacy-Preserving Data Analytics enables the extraction of insights from sensitive data using
methods that combine encryption, aggregation, and quasi-identifier handling [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. These analytics
techniques maintain data confidentiality throughout processing, thereby empowering users to derive
value from sensitive datasets without compromising privacy.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. RECITALS Security Manager</title>
        <p>The responsibility for safeguarding the RECITALS platform against cyber threats lies with the Security
Manager. This component performs two interlinked functions that are based on Cyber-Threat Analysis,
i.e., an systematic overview of the most likely attacks for the RECITALS platform (e.g., AI-powered
attacks, threats to identity). First, the Cyber-Threat Detector identifies threats through anomaly detection,
signature-based recognition, behavioral analysis, endpoint monitoring, and centralized event correlation.
These mechanisms can operate independently or in combination, often enhanced by machine learning
for real-time threat identification.</p>
        <p>Second, once threats are detected, the Cyber-Threat Orchestration, Automation, and Response module
coordinates the necessary countermeasures. It leverages threat intelligence from standards and
opensource sources, such as SIGMA rules and the MITRE framework, to automate response workflows and
dynamically adapt defenses. This enables RECITALS to maintain operational integrity and proactively
manage evolving security risks.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. The RECITALS Consortium</title>
      <p>The RECITALS project brings together a carefully selected consortium of 10 partners from 8 EU countries:
Greece, The Netherlands, France, Portugal, Romania, Germany, Ireland, and Cyprus. The composition
of the consortium was strategically designed to address the multifaceted challenges associated with the
development of the RECITALS platform, combining expertise, diversity, and cohesion.</p>
      <p>A critical design consideration was the balance between academic and industrial perspectives. The
consortium comprises five well-established academic institutions and five industrial organizations,
creating an ideal synergy between theoretical innovation and real-world applicability. The academic
partners include the National and Kapodistrian University of Athens (NKUA), the Delft University of
Technology (TUD), the Université Paris Cité (UPC), the Leibniz University of Hannover (LUH), and the
Dublin City University (DCU). They are renowned universities with significant contributions to research
in fields such as AI, cybersecurity, data management, and privacy preservation On the industrial side, the
consortium includes two large companies, Public Power Corporation SA (PPC) and Orange Romania SA
(ORO), the SMEs Projecto Desenvolvimento Manutencao Formacao e Consultadorialda (PDM) and the
Center for Technology Research and Innovation (CETRI), as well as a major public-sector organization,
the Hospital Do Espirito Santo de Evora EPE (HES).</p>
      <p>This diversity ensures that the RECITALS platform is validated across a range of sectors, making the
project highly adaptable and future-proof. In fact, each partner brings a distinct area of specialization,
as shown in Table1, contributing to a comprehensive skill set that spans both research excellence and
market-oriented implementation. The complementary backgrounds of the consortium members are
a key strength of the project, ensuring that collectively, the consortium covers the full spectrum of
competencies required for building a secure, privacy-respecting, and AI-enhanced identity management
and data-sharing platform.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This project has received funding from the European Union’s Horizon Europe research and innovation
programme under grant agreement No.101168490. The European Commision authority managing
RECITALS project is the European Cybersecurity Compentence Center2.
2https://cybersecurity-centre.europa.eu/index_en</p>
      <p>TUD</p>
      <p>X
X
X
X
X</p>
      <p>PDM</p>
      <p>X
X
X</p>
      <p>X
X
X</p>
      <p>X
X</p>
      <p>X
X</p>
      <p>X
X</p>
      <p>X</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used OpenAI GPT-4o for grammar and spelling check.
After using this tool/service, the authors reviewed and edited the content as needed and take full
responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lindell</surname>
          </string-name>
          , Introduction to Modern Cryptography, Second Edition, CRC Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Paar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pelzl</surname>
          </string-name>
          , T. Güneysu,
          <article-title>Understanding Cryptography - From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms</article-title>
          ,
          <source>Second Edition</source>
          , Springer,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Golpayegani</surname>
          </string-name>
          , I. Hupont,
          <string-name>
            <given-names>C.</given-names>
            <surname>Panigutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schade</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. O'Sullivan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Lewis</surname>
          </string-name>
          ,
          <article-title>AI cards: Towards an applied framework for machine-readable AI and risk documentation inspired by the EU AI act</article-title>
          ,
          <source>CoRR abs/2406</source>
          .18211 (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Golpayegani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <article-title>Aicat: An AI cataloguing approach to support the EU AI act</article-title>
          ,
          <source>CoRR abs/2501</source>
          .04014 (
          <year>2025</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ranzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Carbone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Sciarretta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Marino</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Ranise,</surname>
          </string-name>
          <article-title>The eidas regulation: a survey of technological trends for european electronic identity schemes</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <fpage>12679</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>A. I. Blasco</surname>
          </string-name>
          ,
          <article-title>Digital identity in a european user-centric ecosystem and its similarities with the digital euro proposal</article-title>
          ,
          <source>in: Governance and Control of Data and Digital Economy in the European Single Market</source>
          ,
          <year>2025</year>
          , pp.
          <fpage>453</fpage>
          -
          <lpage>471</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Schwalbe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Finzel</surname>
          </string-name>
          ,
          <article-title>A comprehensive taxonomy for explainable artificial intelligence: a systematic survey of surveys on methods and concepts</article-title>
          ,
          <source>Data Mining and Knowledge Discovery</source>
          <volume>38</volume>
          (
          <year>2024</year>
          )
          <fpage>3043</fpage>
          -
          <lpage>3101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Savadatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Krishnamoorthy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Delhibabu</surname>
          </string-name>
          ,
          <article-title>Survey of distributed ledger technology (DLT) for secure and scalable computing</article-title>
          ,
          <source>IEEE Access 13</source>
          (
          <year>2025</year>
          )
          <fpage>8393</fpage>
          -
          <lpage>8415</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          , et al.,
          <article-title>Creating a vocabulary for data privacy - the first-year report of data privacy vocabularies and controls community group (DPVCG)</article-title>
          ,
          <source>in: OTM</source>
          , volume
          <volume>11877</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>714</fpage>
          -
          <lpage>730</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gkoulalas-Divanis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Vatsalan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Karapiperis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kantarcioglu</surname>
          </string-name>
          ,
          <article-title>Modern privacy-preserving record linkage techniques: An overview</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>16</volume>
          (
          <year>2021</year>
          )
          <fpage>4966</fpage>
          -
          <lpage>4987</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T. H.</given-names>
            <surname>Rafi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Noor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.-K. Chae</surname>
          </string-name>
          ,
          <article-title>Fairness and privacy-preserving in federated learning:</article-title>
          <source>A survey</source>
          ,
          <year>2023</year>
          . URL: https://arxiv.org/abs/2306.08402. arXiv:
          <volume>2306</volume>
          .
          <fpage>08402</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>H.-Y. Tran</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>Privacy-preserving big data analytics a comprehensive survey</article-title>
          ,
          <source>Journal of Parallel and Distributed Computing</source>
          <volume>134</volume>
          (
          <year>2019</year>
          )
          <fpage>207</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>