WITDOM formalized technological requirements

Summary
As the tangible result of subtask 3.1.1, the first revision of this deliverable will present the formal definition of the technological security, privacy and verifiability requirements, taking into account the connection with user-centric requirements and European privacy and data protection legislation. It will also gather the identified limitations of technologies for verifiability and security and privacy protection of outsourced process, and initial approaches for tackling them. This revision at M12 will collect the first results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR