<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mapping legal requirements to SLAs: an ontology based approach for cloud-based service consumption</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dirk Thatmann</string-name>
          <email>d.thatmann@tu-berlin.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Erwin Schuster</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>G¨okhan Coskun</string-name>
          <email>goekhan.coskun@tu-berlin.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>T-Systems Austria GesmbH</institution>
          ,
          <addr-line>Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Technische Universita ̈t Berlin, Service-centric Networking (SNET)</institution>
          ,
          <addr-line>Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This work presents a new approach to ensure compliance to legal regulation in Cloud Computing, especially in Software-as-a-Service. Since high demanding business sectors, such as the health care sector, require high legal certainty, when contracting services offered by external providers. We provide a lightweight ontological representation of the German Federal Data Protection Act (BDSG) and a methodological approach how this work can be extended with additional laws. Furthermore, we integrate the generic ontology into the Linked Unified Service Description Language (Linked-USDL) as Compliance to External Services (Linked-USDL CES) module. This extension enables service customers and providers to negotiate services more fine grained related to legal obligations, which increases legal certainty and thus the acceptance of a cloud-based service consumption. We demonstrate the applicability of the proposed ontology with the concrete use case “physician's letter” that is part of a running national project TRESOR, which aims at the development of a trusted cloud ecosystem.</p>
      </abstract>
      <kwd-group>
        <kwd>Linked-USDL</kwd>
        <kwd>Legal Regualation</kwd>
        <kwd>Ontology</kwd>
        <kwd>BDSG</kwd>
        <kwd>Marketplace</kwd>
        <kwd>Service Selection</kwd>
        <kwd>Cloud Computing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Through increasing awareness for the economic benefits it promises, Cloud
Computing approaches gained momentum. Having neither geographical borders nor
national limits, it is a global market where providers e.g. in India can have
customers in Jamaica. On the one hand, this distribution and flexibility provide
benefits for the customers. They are able to choose between offers from all over
the world and select the most appropriate one. This process is mostly supported
by marketplaces, which provide support for comparing different functional and
non-functional aspects of products from different companies. This in turn,
increases the competition in this market to the benefits of the customers. On the
other hand, it challenges businesses which are subject of legal restrictions and
have to follow national regulatories for the used software and the utilized data.
The aforementioned marketplaces are currently focusing on functional aspects
and have a few non-functional details like pricing information. Due to the
complexity of the laws and the expected legal consequences in case of disregard, the
legal aspects are omitted so far.</p>
      <p>In this paper, we want to attract attention to this issue by presenting concrete
use cases from the health care sector along with the legal regulatories from the
German privacy law. We advocate that legal aspects of Cloud Computing offers
should be semantically described, enabling machine-supported comparability on
marketplaces. By this means, the market is opened for businesses dealing with
sensitive data. Concretely, we present an extension for Linked-USDL that is a
remodeled version of the Unified Service Description Language (USDL). It is
described with semantic technologies and published following the Linked Data
principles. We exemplify the usage of the proposed extension by applying it to
the German privacy law.</p>
      <p>The remainder of this paper is structured as follows. In the following section,
we elaborate the necessity for describing legal aspects of Cloud Computing offers
(focusing on Software-as-a-Service), enabling businesses like the health care
sector to benefit from the economic advantages. In Section 3 we present briefly the
related work in this field. In Section 4 we describe the core contribution of this
work, namely Linked USDL-CES and demonstrate in Section 5 the realization
of a concrete use case. After discussing the main critical points of this work in
Section 6, we conclude the paper with as summary and outlook in Section 7.
2</p>
      <p>The Need for Describing Legal Aspects of SaaS Offers
Today, almost every organization makes use of IT components and software
products to some extend. Thus, optimizations of capital as well as operational
expenditure for IT solutions is concerning everyone. This explains the payed
attention attracted by and the success of Cloud Computing approaches. By
bundling resources and allowing shared usage, the different business models like
Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and
Softwareas-a-service (SaaS) optimize the exploitation of hardware as well as software
components. This is expected to lead to promising significant economic benefits
for the customers, which is mostly a convincing argument for the management
levels of various organizations.</p>
      <p>Being at the highest abstraction layer, SaaS solutions address end-users and
have therefore the biggest audience. Whoever uses software is a potential
customer for SaaS providers and can leverage its economic advantages. Currently,
daily used enterprise software like office products and customer relationship
management software as well as very specialized graphic tools for design experts are
available “out-of-the-cloud”. This allows SaaS providers to offer their products
globally and to acquire customers all over the world, where network connectivity
is the only requirement.</p>
      <p>For supporting the customers in selecting the best offer for their needs,
different marketplaces for SaaS offers arise which provide functional as well as
non-functional descriptions of existing offers and allow their comparison.
However, for particular business sectors SaaS solutions are still not usable. As one
concrete example, the health sector is subject of comprehensive legal restrictions
and regulations. Although, a very simple SaaS solution for storing and editing
doctors’ records about patient treatment would reduce the costs of health care
institutions significantly, this sector cannot make use of the economic benefits
current Cloud Computing based solutions provide. In the current situation each
institution has to have its own IT infrastructure and administration staff. Driven
by this motivation, the currently running project Trusted Ecosystem for
Standardized and Open cloud-based Resources (TRESOR) aims at opening the SaaS
market for the health sector.</p>
      <p>The main objective of TRESOR is the development of a trusted cloud
ecosystem that consists of an open platform for offering and consuming cloud services.
A broker and marketplace component mediates and combines services, whereas
a proxy enables the access to those cloud services by taking enterprise guidelines,
regulations by law and security policies into consideration.</p>
      <p>A central part of the TRESOR broker is the service description language,
that enables describing various aspects of SaaS offers. The Linked-USDL
extension that is presented in this paper is a possible add-on of this description
language. With this extension, the health care institutions are able to control to
which extend the offers are compliant with legal requirements, select the most
appropriate one and establish negotiations. Due to the societal aspects of this
particular sector, the achieved significant cost reduction is expected to have a
remarkable impact on the societal expenses.
3</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>Our goal is to support a fine grained description of compliance to legal
regulations in a service description in order to increase legal certainty on both service
provider and customer side. Our main task is to realize a Service Description
Language (SDL) with a lightweight ontology, able to express the BDSG and
similar acts. Especially, legal obligations for service customers and providers
including their relation to operation of a services and any processing of data are of
interest. As next, we list and rate the related work in accordance with our tasks.
In our rough structuring we differentiate between expressive and lightweight
ontologies. Representatives of expressive ontologies are:</p>
      <p>
        There are several ontologies in the field of legal reasoning and argumentation.
Edwina Rissland et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] discussed the characteristics of the legal domain and
its main points of interest for the application of AI techniques in 1985. In [13,
p. 2] seven challenges are listed that AI and the legal domain face. Since then,
many representational languages and legal rules have been invented. However,
none reached the full expressiveness and complexity of existing legal texts in
a consistent manner [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Gorden et al. present a formal, mathematical model
of argument evaluation which applies proof standard [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Prakken’s model [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
is suitable for modeling particular legal procedures, learning about actual
legal procedures and to learn about the process of formalizing an actual legal
dispute. Bru¨ninghaus’ [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] methods automatically generate legal argumentation
and predictions from case texts. The Ontology of Professional Judicial
Knowledge (OPJK) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] focuses on semantic search in the context of question and
answer (Q&amp;A) systems. A request, formulated in a natural language, leads to
a response with a high level of consilence. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] but has no added value for our
use-case. Gangemi et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] introduce a design pattern for defining legal content
ontologies. Whereas Despres et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] focus on how to apply a linguistics-based
tool “TERMINAE” to the legal domain and its alignment to core ontologies.
However, all these approaches do not support us in our main objective to
describe services and its properties related to legal regulations, such as required
by the BDSG.
      </p>
      <p>
        In the field of E-Contracting, the description of legal aspects and obligations
mainly focus on general Terms and Conditions. Lamparter et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] introduce
a formal model in cooperating common contractual items and rights/obligations
and applies the model in a scenario proofing the creditworthiness of customers.
The defined ontology allows the use of SWRL-based [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] rules in order to enable
automated proofing of the results. However, this work seems to have several
similarities and overlaps with our use-case, but does not focus on how to incorporate
legal obligations.
      </p>
      <p>
        The LKIF-core [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] bases on OWL. It covers a standard vocabulary of basic
legal terms having the focus on scenarios where the exchange of knowledge
between different knowledge-based systems is required. LKIF’s shortcomings are
twofold. Firstly, both legal modules “legal-action” and “legal-role” offer terms
which support the definition of rules in the context procedural terms and roles
(compare action- role process). Furthermore, it is not easily possible to link to
a specific law, such as the BDSG. This could lead to the need of extensive
expansions. Secondly, the core ontology is defined in English. A mapping layer and
legal dictionaries are required, which means that an additional fuzzy layer is
present.
      </p>
      <p>
        Kn¨opfler’s ontology already concentrates on the BDSG. However, his work is
motivated by the Computational Law. His ontology [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] maps rules taken from
the BDSG to programmable logic. Due to pragmatic reasons, Kn¨opfler chooses
SWI-PROLOG [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] to proof the fundamental technical feasibility of his idea. He
selects just a single section out of a total of 63 which already leads to an
impressive amount of rules and objects. A meaningful and appropriate visualization is
extremely difficult (comp. [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] p. 298.) to achieve. However, only few segments
seem to be reusable for our goal to develop an ontology addressing compliance
to legal regulation during a service description and requirement matching.
      </p>
      <p>
        In contrast to aforementioned expressive legal ontologies, we identified several
lightweight ontologies in the legal domain. This includes ontologies used for
representation of legal documents, such as MetaLex [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], a structured and nearly
complete representation, and the Akoma Ntosa XML standard presented by
Barabucci et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The European Union published the multi-language thesauri
EuroVoc [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], which contains a subsection for legal terms. EuroVoc bases on
a SKOS extension [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and new definitions are taken from the dublin-core [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
However, these technologies and achievements can only supplement our solution.
      </p>
      <p>
        In the field of SDL, we identified the Linked-USDL [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], since it combines the
Linked Data [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] principles and the Web of Data by remodeling the existing
USDL specification as RDF(S) vocabulary in order to enable a better support
for machines when trading services on the Web of Data. Linked-USDL currently
contains three modules: USDL-Core, USDL-Pricing and USDL-SLA [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The
USDL comes with a legal module which is designed only to express copyright
and license information. Thus, it is not usable to support legal compliance as
defined in our scope.
      </p>
      <p>Summing up, we have to propose our own lightweight ontology for
describing services and their compliance to legal regulation for service discovery and
selection scenarios. We choose Linked-USDL since its wide scope, its
LinkedData alignment and its focus on services descriptions seem to provide the most
promising basement for adding appropriate ontologies able to describe acts and
their obligations for service providers and consumers.
4</p>
      <p>Ontological Description of Legal Compliance
The essential criteria for reliable decisions based upon service descriptions are
twofold. The first criteria is a matter of knowledge and trust. The service to
be described has to be known in-depth. By letting the service creator and
service provider create the description, who are expected to possess the mentioned
knowledge, this can be regarded merely as a question of trust. As such, it can
be tackled e.g. by the introduction of a trusted 3rd party or some certification
procedures. The second criteria is the quality of the service description language
as well as its usability. On the one hand, the expressivity needs to allow the
correct description of various facets. On the other hand, it needs to be easy to
understand and to use.</p>
      <p>Aiming at the description of legal aspects of SaaS services, we advocate
making use of semantic technologies and following the Linked Data principles
in reusing existing vocabularies and interlinking newly created ones with
existing Web ontologies. To be more concrete, the Resource Description
Framework (RDF), RDF Schema (RDFS) and the Web Ontology Language (OWL))
emerged from the Semantic Web vision and defined as standards by the World
Wide Consortium (W3C) represent a profound basis for expressiveness in
defining a language. Along with manifold tools for editing and reasoning, the usage
of these standards is very promising. Additionally, the ever increasing number of
online available vocabularies and ontologies for various domains, including the
service description domain as well as the legal domain, encourage their reuse by
pragmatically following the Linked Data principles. Reusing existing and broadly
used ontologies, which can be seen as de-facto-standards, is expected to simplify
the understanding of the new language constructs.
4.1</p>
      <p>
        From the Law to the Ontology
The endeavor to develop an ontology, which provides language constructs to
describe legal aspects of SaaS offers, requires the analysis of valid and relevant laws
for the particular context. Due to the circumstance of the TRESOR project, we
focused on the Germany Federal Data Protection Act (Bundesdatenschutzgesetz
- BDSG)[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Because of the complexity of the domain as well as the
hierarchical relations between national, European and global regulations, we decided to
start with the concrete and develop the ontology in a bottom up approach. For
that purpose, we analyzed the text of the Germany privacy law and modeled
the domain ontology.
      </p>
      <p>We extracted nine concrete characteristics applicable to SaaS services, which
we call Compliance Criteria. For each we defined a set of possible Criteria Values.
Figure 2- A illustrates this in a simple notation.</p>
      <p>
        The extraction process we applied consist of the following steps:
1.0 Rough structuring of the BDSG [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] and scope reduction.
2.0 Define and structure the requirements.
      </p>
      <p>2.1 Compliance BDSG examples
2.2 Compliance BDSG and USDL-CES
3.0 Defining an ontology - The USDL-CES</p>
      <p>Through the first step (rough structuring), we identified the following six
sections. (1) General and common provisions, (2) Data processing by public
bodies, which includes subsections, such as Legal basis for data processing, Rights
of the data subject and Federal Commissioner for Data Protection and Freedom
of Information. (3) section Data processing by private bodies and commercial
enterprises under public law contains of three subsections. The subsection Legal
basis for data processing is followed by Rights of the data subject and Supervisory
authority. In the end the structuring conclude with (4) Special-, (5) Final- and
(6) Transitional-provisions. Based on this structure we can now concentrate on
further questions, such as:
Bundesdatenschutzgesetz TBDSG&amp;</p>
      <p>TGerman3Federal3Data3Protection3Act&amp;</p>
      <p>Recording
Alteration
Transferring
Blocking
Erasing</p>
      <p>Non3special
Credit3nistitute
PolOPhilORelO
Unions
Research
organisation</p>
      <p>Press
DeutscheWel e</p>
      <p>Official3secrecy
Suspected
Indictable
Account3data
Professional
secrecy
Research
Anonymised
Controct3data
processor
Identifiable
natural3person
j rd3party
Responsable
processing
point</p>
      <p>Internal3use
Advertisment
Foreign
advertisment
Reporting
agency
Scoring</p>
      <p>Data
Transmission
Address
Col ection R
Transfer
Address
directory</p>
      <p>Non3personal</p>
      <p>data
Personal3data</p>
      <p>Special
personal3data
Criminal
offense
Anonym3data
transmission</p>
      <p>Market
research
Data3privacy
Employment.</p>
      <p>related
transmission</p>
      <p>Zweckbestimmung
TPurpose3and
scope&amp;
Using
Processing
Processing
Using
Gathering
Gathering
Using
Gathering
Processing
Gathering
Processing</p>
      <p>Using
Empfänger
TRecipient&amp;</p>
      <p>TBGuessincehsäsft3sOzbwjeecctkiv&amp; TPrSoctehcuttizoknla3sClsaess&amp;</p>
      <p>Verarbeitung
TProcessing&amp;</p>
      <p>UnternehmensArt
TEnterprise3class&amp;</p>
      <p>Schutzart
TProtection3class&amp;</p>
      <p>Stel en
TPublic3and3private
bodies&amp;
Family.related
EU3countries</p>
      <p>Public</p>
      <p>Public
competition
Non.public</p>
      <p>Zweck
Tpurpose&amp;
free3text</p>
      <p>Q: Which sections contain relevant information for legal compliance? Which
we answer by: all sections containing obligations.</p>
      <p>Q: Which sections contain rights for 3rd parties? For the opposite case this
can be seen as obligations for service-customers and service-providers which
includes e.g. rights, such as “provision of information and granting permission to
consult records to the persons concerned”.</p>
      <p>In order to reduce the scope, answering the opposite questions help to exclude
non-relevant legal text parts.</p>
      <sec id="sec-2-1">
        <title>Recipient (Empf¨anger)</title>
        <p>In our case, based on the recently introduced BDSG sections, our result can
be summed up as: the core of the relevant legal sections are part of Section
2 and 3. Here we find concrete rules and guidelines for handling data within
different scopes and purposes, distinguished by public and private institutions.
This informations is important, since service providers do not know
servicecustomers’ obligations. Furthermore, Section 4 “Lawfulness of data collection,
processing and use” is important, since (1) stated: “The collection, processing
and use of personal data shall be lawful only if permitted or ordered by this Act
or other law, or if the data subject has provided consent”. In summary, it can
be ascertained that after rough structuring and scope reduction some Sections,
such as Section 1, Section 2 including Subsection 3, Section 5 and 6 (Final- and
Transitional-provisions) can be skipped.</p>
        <p>
          Gathering criteria is time consuming (and can be improved or automated
for sure), since it requires to understand the legal text in details and derive
necessary conclusions. The complete result of our work is spread over approximated
20 printed pages. Therefore, we are going to list just some for Section 5 relevant
use-case criteria in Table 1 and 2. However, additional information is available
online [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]:
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Public and Private Bodies (Stelle ) Name Value Description</title>
        <p>Following the design of Linked-USDL, we introduce USDL-CES module in order
to address common Compliance for External Services (CES). The goal of CES is
to create a structure which can express on the one hand afore mentioned BDSG
taxonomy and on the other laws, structured in a similar way. Figure 3- B depicts
the ontology. The three levels between Figure 2- A and Figure 3- B are congruent
and show how to instantiate the BDSG-Taxonomy. “BDSG” maps to “Statute
or Act”, “Recipients” maps to “Compliance criteria” and “3rd Party” maps to
“Criteria Value”. In case of replacing the taxonomy by an
has</p>
        <p>0..1
usdl-sla:
ServiceLevelProfil
has</p>
        <p>1…*
usdl-sla:
ServiceLevel
usdl-core:
Service
has</p>
        <p>0..1
usdl-ces:
ComplianceLevel</p>
        <p>Profile
has</p>
        <p>1…*
usdl-ces:
ComplianceLevel
has</p>
        <p>1…*
has 0…*</p>
        <sec id="sec-2-2-1">
          <title>Gesetz</title>
          <p>StatuteLorLAct
has
has
1…*
Compliance-Merkmal
ComplianceLCriteria</p>
          <p>0…*</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>Ausprägung</title>
          <p>CriteriaLValue</p>
          <p>B
appropriate taxonomy expressing other acts, different namespaces should be
introduced and applied.
In order to use this ontology for service description, we combine the USDL-CES
with Linked-USDL, as depicted in Figure 3.
5</p>
          <p>Realizing a Use-Case with Linked USDL-CES
We apply our approach to a sample use-case motivated by the TRESOR project.
In this example a hospital, which is a Public Enterprise and acts as a Public Body
wants to use a Physician’s Letter -service provided by an external service provider
(Recipient: 3rd party). The hospital’s requirements on legal regulation related
to this use-case are listed in Table ??. Since the Business Objective is set to
Internal Usage, the hospital may - under specific requirements - use (compare
BDSG Section 14) the Special Personal Data for other internal purposes.
Special Personal Data refers to especially Sensitive Personal Information (compare
BDSG Section 3, Paragraph 9) to be processed, which includes medical data
of patients. For instance, the service provider retrieves the knowledge by both
statements, that the usage of Special Personal Data under the terms an
definition of BDSG Section 14, Paragraph 5 is permitted even if the purpose is not
listed. Since Physician’s Letter is stated as purpose the service provider can
derive that it is prohibited to transfer the data to 3rd parties, such as laboratories.
This example shows how restrictive the criteria can be handled and enforced
with our approach. In addition, we achieve a high level of compliance to legal
regulation which means a higher level of legal certainty for all parties, service
customer (SC) and service provider (SP).</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>Compliance Criteria (Name)</title>
      </sec>
      <sec id="sec-2-4">
        <title>Criteria Value (Auspr¨agung) English German English German</title>
        <p>Due to the challenging objective of this work, it has inherently some critical
points, we want to discuss briefly in this section. The first one is the semantic
complexity and expressiveness of the proposed ontology. However, the creation
of an ontological representation of laws is a difficult task. Even if the ontology
engineer focuses only on a small part. On the one hand, understanding the
meaning of legal text in-depth without being an expert for the concrete legal text at
hand is very challenging. In order to understand all aspects and to comprehend
the interrelation with other laws, it is also necessary to know how judges
interpreted the text and how they made their decisions in concrete examples. On the
other hand, creating a comprehensive ontology, that represents such a complex
knowledge exhaustively seems to be unfeasible. This is due to the fact, that
reliable decisions in this context can only be made within margin of discretion by
humans, respective judges.</p>
        <p>Therefore, an ontology for such a domain is not expected to represent the
knowledge enabling automatic decision making, but the basic terms in order
to allow communicating the legal aspects between providers and customers. In
this concrete work, we aim at providing a basic set of terms, representing an
extraction from the German law, namely BDSG, and allowing SaaS providers
to communicate legal compliance. We are convinced that such a description is
essential for the success of SaaS for sensitive business sectors and want to attract
attention to this issue and make a first proposal.</p>
        <p>A second critical aspect is its focus on the German law. However, as one of
the most comprehensive privacy data protection laws available, we think that it
provides a good starting point and represents the basis for fruitful discussions
for the next steps, towards an international standard.</p>
        <p>The last critical aspect, we want to mention is the following. For a really
legally valid description language, an internationally accepted standard has to
be created with the authorities in this area. Until then, we think it is of high
value to work on basics towards this challenging goal and expect some
lightweight ontologies become de-facto-standards. These in turn, can simplify the
definition of a real standard.
7</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Summary and Outlook</title>
      <p>
        In order to support a better legal compliance when negotiating contracts between
SaaS consumers and providers, we propose a generic methodology for deriving a
taxonomy for specific laws/acts, such as the German Federal Data Protection Act
(BDSG). Based on the taxonomy we described how to instantiate the taxonomy
in our generic Linked-USDL CES module, which we propose as new extension for
Linked-USDL. As proof of concept, we applied our approach in a sample use-case
named Physician’s Letter in the context of the Cloud Ecosystem TRESOR [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Since we finished our research before Pedrinaci et al. presented a Linked-USDL
vocabulary [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], we have to check whether an adaptation is required. A next step
could be to create taxonomies for other German or European acts.
Acknowledgments. This work was performed in the context of the TRESOR
project and was funded by the German Federal Ministry of Economic Affairs
and Energy.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>1. Dublin Core, http://eurovoc.europa.eu/drupal/?q=de/abouteurovoc,http:// dublincore.org/documents/2012/06/14/dcmi-terms/?v=elements</mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Linked</given-names>
            <surname>Data</surname>
          </string-name>
          . W3C, http://www.w3.org/standards/semanticweb/data
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Simple</given-names>
            <surname>Knowledge Organization</surname>
          </string-name>
          <article-title>System (SKOS)</article-title>
          .
          <source>W3C</source>
          , http://www.w3.org/
          <year>2004</year>
          /02/skos/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Thesaurus</surname>
            <given-names>EuroVoc</given-names>
          </string-name>
          , http://eurovoc.europa.eu/drupal/?q=de/node/411
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Unified</given-names>
            <surname>Service Description Language (USDL). W3C Language Incubator Group</surname>
          </string-name>
          , http://www.w3.org/2005/Incubator/usdl/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>TRESOR</surname>
          </string-name>
          (
          <year>2012</year>
          ), http://www.cloud-tresor.com/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Linked-Data</surname>
            <given-names>CES</given-names>
          </string-name>
          (
          <year>March 2013</year>
          ), http://cloud-tresor.de/linked-usdl-ces/
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Barabucci</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cervone</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palmirani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peroni</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vitali</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <article-title>: Multi-layer Markup and Ontological Structures in Akoma Ntoso</article-title>
          . In: Casanovas,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Pagallo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Sartor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Ajani</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <article-title>AI Approaches to the Complexity of Legal Systems</article-title>
          .
          <source>Complex Systems, the Semantic Web, Ontologies, Argumentation, and Dialogue, Lecture Notes in Computer Science</source>
          , vol.
          <volume>6237</volume>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>149</lpage>
          . Springer Berlin Heidelberg (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Boer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winkels</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vitali</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>MetaLex XML and the Legal Knowledge Interchange Format</article-title>
          . In: Casanovas,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Sartor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Casellas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Rubino</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.)
          <source>Computable Models of the Law, Lecture Notes in Computer Science</source>
          , vol.
          <volume>4884</volume>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>41</lpage>
          . Springer Berlin Heidelberg (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. Bru¨ninghaus,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Ashley</surname>
          </string-name>
          , K.D.:
          <source>Generating Legal Arguments and Predictions from Case Texts. In: Proceedings of the 10th International Conference on Artificial Intelligence and Law</source>
          . pp.
          <fpage>65</fpage>
          -
          <lpage>74</lpage>
          . ICAIL '05,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Carlos</given-names>
            <surname>Pedrinaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.L.</given-names>
            :
            <surname>Linked</surname>
          </string-name>
          <string-name>
            <surname>USDL</surname>
          </string-name>
          (
          <year>2012</year>
          ), http://www.linked-usdl.org/
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Casellas</surname>
          </string-name>
          , N.:
          <article-title>Modellinglegal knowledge through ontologies. OPJK: The Ontology of professional judicial knowledge</article-title>
          .
          <source>Ph.D. thesis (Dec</source>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Casellas</surname>
          </string-name>
          , N.:
          <string-name>
            <surname>Legal Ontology</surname>
          </string-name>
          Engineering - Methodologies,
          <source>Modelling Trends, and the Ontology of Professional Judicial Knowledge</source>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Despres</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szulman</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>TERMINAE Method and Integration Process for Legal Ontology Building</article-title>
          .
          <source>In: Proceedings of the 19th International Conference on Advances in Applied Artificial Intelligence: Industrial, Engineering and Other Applications of Applied Intelligent Systems</source>
          . pp.
          <fpage>1014</fpage>
          -
          <lpage>1023</lpage>
          . IEA/AIE'06,
          <string-name>
            <surname>SpringerVerlag</surname>
          </string-name>
          , Berlin, Heidelberg (
          <year>2006</year>
          ), http://dx.doi.org/10.1007/11779568_
          <fpage>108</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Design patterns for legal ontology construction</article-title>
          .
          <source>In: The semantic Web and the Regulation of Electronic Social Systems</source>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>German</surname>
          </string-name>
          <article-title>Federal Ministy of Justice: Federal Data Protection Act (BDSG)</article-title>
          .
          <source>Federal Law Gazette I (September</source>
          <year>2009</year>
          ), http://www.bfdi.bund.de/EN/ DataProtectionActs/Artikel/BDSG_idFv01092009.
          <article-title>pdf, federal Data Protection Act (BDSG) as at 1 September 2009 with amendments 2010</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Gordon</surname>
            ,
            <given-names>T.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rotolo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Rules and Norms: Requirements for Rule Interchange Languages in the Legal Domain</article-title>
          . In: Governatori,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Hall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Paschke</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Rule Interchange and Applications, Lecture Notes in Computer Science</source>
          , vol.
          <volume>5858</volume>
          , pp.
          <fpage>282</fpage>
          -
          <lpage>296</lpage>
          . Springer Berlin Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Gordon</surname>
            ,
            <given-names>T.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walton</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The Carneades Argumentation Framework: Using Presumptions and Exceptions to Model Critical Questions</article-title>
          .
          <source>In: Proceedings of the 2006 Conference on Computational Models of Argument: Proceedings of COMMA 2006</source>
          . pp.
          <fpage>195</fpage>
          -
          <lpage>207</lpage>
          . IOS Press, Amsterdam, The Netherlands, The
          <string-name>
            <surname>Netherlands</surname>
          </string-name>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tabet</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dean</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>SWRL: A Semantic Web Rule Language Combining OWL and RuleML</article-title>
          (Mai
          <year>2004</year>
          ), http://www.w3.org/Submission/SWRL/
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lamparter</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luckner</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mutschler</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Formal Specification of Web Service Contracts for Automated Contracting and Monitoring</article-title>
          .
          <source>In: System Sciences</source>
          ,
          <year>2007</year>
          .
          <source>HICSS</source>
          <year>2007</year>
          .
          <article-title>40th Annual Hawaii Intl</article-title>
          . Conference on. pp.
          <fpage>63</fpage>
          -
          <lpage>63</lpage>
          (
          <year>Jan 2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Leidig</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Momm</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>USDL Service Level Agreements</article-title>
          . http://www. linked-usdl.org/ns/usdl-sla (
          <year>April 2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <article-title>Linked Data Community: Linked Data</article-title>
          , http://linkeddata.org/
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Pedrinaci</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cardoso</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leidig</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Linked</surname>
            <given-names>USDL</given-names>
          </string-name>
          :
          <article-title>A Vocabulary for Web-scale Service Trading (April</article-title>
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Prakken</surname>
          </string-name>
          , H.:
          <article-title>Formalising ordinary legal disputes: a case study</article-title>
          .
          <source>Artificial Intelligence and Law</source>
          <volume>16</volume>
          (
          <issue>4</issue>
          ),
          <fpage>333</fpage>
          -
          <lpage>359</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Rissland</surname>
          </string-name>
          , E.:
          <article-title>AI and Legal Reasoning</article-title>
          .
          <source>AI Mag</source>
          .
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <fpage>45</fpage>
          -
          <lpage>55</lpage>
          (
          <year>Sep 1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Sartor</surname>
          </string-name>
          , G.:
          <article-title>Legal concepts as inferential nodes and ontological categories</article-title>
          .
          <source>Artificial Intelligence and Law</source>
          <volume>17</volume>
          (
          <issue>3</issue>
          ),
          <fpage>217</fpage>
          -
          <lpage>251</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Siegfried</surname>
          </string-name>
          <article-title>Kno¨pfler: Computational Law und Datenschutz: Innovativer Datenschutz</article-title>
          . Duncker &amp; Humblot Berlin (
          <year>2012</year>
          ),
          <source>ISBN 978-3-428-13860-9</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Slawik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Domain Specific Language and a Pertinent Business Vocabulary for Cloud Service Selection</article-title>
          .
          <source>In: Proceedings of the 11th International Conference on Economics of Grids, Clouds, Systems and Services (GECON)</source>
          .
          <source>Springer (Sep</source>
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Wielemaker</surname>
          </string-name>
          , J.: SWI-Prolog, http://www.swi-prolog.org/
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>