{"id":"https://openalex.org/W7131666074","doi":"https://doi.org/10.3390/software5010010","title":"CONSENT: A Software Architecture for Dynamic and Secure Consent Management","display_name":"CONSENT: A Software Architecture for Dynamic and Secure Consent Management","publication_year":2026,"publication_date":"2026-02-26","ids":{"openalex":"https://openalex.org/W7131666074","doi":"https://doi.org/10.3390/software5010010"},"language":"en","primary_location":{"id":"doi:10.3390/software5010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/software5010010","pdf_url":"https://www.mdpi.com/2674-113X/5/1/10/pdf?version=1772116443","source":{"id":"https://openalex.org/S4210183365","display_name":"Software","issn_l":"2674-113X","issn":["2674-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.mdpi.com/2674-113X/5/1/10/pdf?version=1772116443","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126874423","display_name":"Christina Zoi","orcid":null},"institutions":[{"id":"https://openalex.org/I89506807","display_name":"University of Western Macedonia","ror":"https://ror.org/00a5pe906","country_code":"GR","type":"education","lineage":["https://openalex.org/I89506807"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christina Zoi","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Western Macedonia, 50 150 Kozani, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Western Macedonia, 50 150 Kozani, Greece","institution_ids":["https://openalex.org/I89506807"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035530115","display_name":"Ioannis Zozas","orcid":"https://orcid.org/0000-0003-2159-1332"},"institutions":[{"id":"https://openalex.org/I89506807","display_name":"University of Western Macedonia","ror":"https://ror.org/00a5pe906","country_code":"GR","type":"education","lineage":["https://openalex.org/I89506807"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Zozas","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Western Macedonia, 50 150 Kozani, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Western Macedonia, 50 150 Kozani, Greece","institution_ids":["https://openalex.org/I89506807"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123374468","display_name":"Stamatia Bibi","orcid":null},"institutions":[{"id":"https://openalex.org/I89506807","display_name":"University of Western Macedonia","ror":"https://ror.org/00a5pe906","country_code":"GR","type":"education","lineage":["https://openalex.org/I89506807"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Stamatia Bibi","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Western Macedonia, 50 150 Kozani, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Western Macedonia, 50 150 Kozani, Greece","institution_ids":["https://openalex.org/I89506807"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123374468"],"corresponding_institution_ids":["https://openalex.org/I89506807"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54522243,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"1","first_page":"10","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.12430000305175781,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.12430000305175781,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.12409999966621399,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.12139999866485596,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6315000057220459},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.555899977684021},{"id":"https://openalex.org/keywords/audit-trail","display_name":"Audit trail","score":0.47839999198913574},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.3831000030040741},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.38019999861717224},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.37470000982284546},{"id":"https://openalex.org/keywords/software-architecture","display_name":"Software architecture","score":0.3208000063896179}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6527000069618225},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6315000057220459},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.555899977684021},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5221999883651733},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.47839999198913574},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.38659998774528503},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3831000030040741},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.37470000982284546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3732999861240387},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.35269999504089355},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.3208000063896179},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C58328972","wikidata":"https://www.wikidata.org/wiki/Q184609","display_name":"Expert system","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.28119999170303345},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2800999879837036},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.266400009393692},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C68122502","wikidata":"https://www.wikidata.org/wiki/Q764527","display_name":"Informed consent","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/software5010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/software5010010","pdf_url":"https://www.mdpi.com/2674-113X/5/1/10/pdf?version=1772116443","source":{"id":"https://openalex.org/S4210183365","display_name":"Software","issn_l":"2674-113X","issn":["2674-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:92770d7f6b5141528a5c7ef9215a3128","is_oa":true,"landing_page_url":"https://doaj.org/article/92770d7f6b5141528a5c7ef9215a3128","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Software, Vol 5, Iss 1, p 10 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/software5010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/software5010010","pdf_url":"https://www.mdpi.com/2674-113X/5/1/10/pdf?version=1772116443","source":{"id":"https://openalex.org/S4210183365","display_name":"Software","issn_l":"2674-113X","issn":["2674-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5152133703231812}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7131666074.pdf","grobid_xml":"https://content.openalex.org/works/W7131666074.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Current":[0],"research":[1],"in":[2,30,113,199],"consent":[3,61,162,214],"management":[4,163],"techniques":[5],"focuses":[6],"on":[7,86,173],"isolated":[8],"aspects":[9],"of":[10,127],"data":[11],"security,":[12],"privacy,":[13],"or":[14],"auditability,":[15],"but":[16],"important":[17],"issues":[18,93],"like":[19],"(i)":[20],"dynamically":[21],"integrating":[22],"regulatory":[23,117,128],"updates":[24,129],"into":[25,130],"form":[26,114,141,174],"generation,":[27],"(ii)":[28],"support":[29],"content":[31,142],"generation":[32,115],"with":[33],"verifiable":[34],"audit":[35],"trails,":[36],"and":[37,72,80,116,132,143,154,167,181,187],"(iii)":[38],"tools":[39],"that":[40,58,123,192],"make":[41],"compliance":[42,73,144,206],"reasoning":[43,62,139],"transparent":[44],"for":[45,68,78,137,159,211],"non-legal":[46],"users":[47],"are":[48],"not":[49],"yet":[50],"addressed.":[51],"This":[52],"paper":[53],"introduces":[54],"CONSENT,":[55],"an":[56],"architecture":[57,84,147],"integrates":[59],"AI-based":[60],"using":[63],"Large":[64],"Language":[65],"Models":[66],"(LLMs)":[67],"automated":[69],"consent-form":[70,200],"drafting":[71],"evaluation,":[74],"alongside":[75],"blockchain":[76],"technology":[77],"secure":[79],"auditable":[81],"storage.":[82],"The":[83],"builds":[85],"prior":[87],"work":[88],"to":[89],"address":[90],"the":[91,125,138,171,196],"aforementioned":[92],"by":[94],"introducing":[95],"three":[96],"supporting":[97],"mechanisms:":[98],"(a)":[99],"Specialized":[100],"AI":[101,135],"models":[102],"coordinated":[103],"through":[104,150],"expert":[105],"routing":[106],"which":[107],"coordinate":[108],"subtasks":[109],"such":[110],"as":[111,183,185],"automation":[112],"compliance,":[118],"(b)":[119],"Retrieval-Augmented":[120],"Generation":[121],"(RAG)":[122],"supports":[124],"integration":[126],"forms,":[131],"(c)":[133],"Explainable":[134],"(XAI)":[136],"behind":[140],"assessments.":[145],"CONSENT":[146,193],"is":[148],"evaluated":[149,170],"250":[151],"test":[152],"cases":[153],"a":[155],"pilot":[156],"case":[157],"study":[158],"clinical":[160],"trial":[161],"involving":[164],"20":[165],"engineers":[166],"attorneys,":[168],"who":[169],"prototype":[172],"quality":[175],"(i.e.,":[176],"coherence,":[177],"conciseness,":[178],"factuality,":[179],"fluency,":[180],"relevance)":[182],"well":[184],"time":[186],"effort":[188,198],"efficiency.":[189],"Results":[190],"show":[191],"substantially":[194],"reduces":[195],"manual":[197],"creation":[201],"while":[202],"providing":[203],"transparent,":[204],"audit-ready":[205],"assessments,":[207],"highlighting":[208],"its":[209],"potential":[210],"dynamic,":[212],"user-centric":[213],"management.":[215]},"counts_by_year":[],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2026-02-27T00:00:00"}
