=Paper=
{{Paper
|id=Vol-2615/paper1
|storemode=property
|title=Towards Integrated Data Control for Digital Twins in Industry 4.0
|pdfUrl=https://ceur-ws.org/Vol-2615/paper1.pdf
|volume=Vol-2615
|authors=Sebastian R. Bader,Maria Maleshkova
|dblpUrl=https://dblp.org/rec/conf/esws/BaderM20
}}
==Towards Integrated Data Control for Digital Twins in Industry 4.0==
Towards Integrated Data Control for Digital Twins in Industry 4.0 Sebastian R. Bader1[0000−0003−1328−704X] and Maria Maleshkova2[0000−0003−3458−4748] 1 Fraunhofer IAIS, Schloss Birlinghoven, 53757 Sankt Augustin, Germany 2 University of Bonn, Endenicher Allee 19a, 53115 Bonn, Germany Abstract. The Digital Twin is currently a widely discussed topic for presenting and exchanging information on physical assets through vir- tual networks. Especially the digitisation of the manufacturing industry, Industry 4.0, drives the implementation of Digital Twins as part of inte- grated production processes. Hence, the protection of sensitive data be- comes an evident challenge. We contribute by determining the require- ments of current scenarios, the descriptive expressiveness of necessary vocabularies, and by formalising the involved operations. The Asset Ad- ministration Shell is used as a concrete metamodel for Digital Twins and is combined with the data sovereignty and enforcement concepts of the International Data Spaces to illustrate how these concepts can be implemented into a comprehensive Industry 4.0 scenario. Keywords: digital twin · asset administration shell · usage control · industry 4.0 1 Introduction The excessive use of the term ’Digital Twin’ in many different contexts makes it nearly impossible to find a proper definition that covers all intended use cases. While this vagueness certainly is one reason for the success of the terminology it- self, it significantly complicates its technical implementation. As a consequence, several influential initiatives and standardisation consortia have recently pub- lished detailed technical specifications and requirement lists for respective Digi- tal Twin realisations. This technical grounding and consolidation process states what a Digital Twin must provide and how it needs to behave. The resulting specifications can be seen as the backbone for every practical roll-out of Digital Twins in productive settings. Especially in the industrial domain faces a rising the demand for standard- ised, interoperable and semantically described physical assets. The heteroge- neous machine parks – and the thereby created inefficiencies through elaborate integration steps, difficult maintenance procedures and the various information flows across companies – motivate Digital Twins as the core information carrier in a digital integration layer. The interoperability of assets is required due to the distributed nature of industrial production and the fact that the regarded Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). 2 Bader and Maleshkova digitisation processes usually happen in brownfield environments. Different to greenfield scenarios, brownfield settings contain a legacy systems and facilities, which cannot be replaced easily. The semantically unambiguous descriptions are necessary due to an unmanageable amount of different terms, definitions and data models, even within the same company. One of the most critical concerns are certainly the ensuring of data security and privacy. Part of that is the protection of business-critical information and know-how. The desired opening of interfaces, systems and devices contains the risk of losing control of these resources. This paper outlines ways and processes how digital data can be exchanged through the Asset Administration Shell as one implementation of Digital Twin but at the same time ensuring that the con- taining information stays protected. We propose mechanisms relying on current standards, the concept of data sovereignty as proposed by the International Data Spaces (IDS) and incorporating the conventions of the Semantic Web. We outline our vision of the AAS Digital Twin at the intersection of Web technologies, industrial requirements and privacy protection (1), explain how the Industry 4.0 requirements can be faced with Usage Control Contracts (2) and provide discussion points required to be solved for further progress in the domain (3). The following section gives a brief overview of the current situation, with a short discussion on related research works in Section 3. We provide a reference example in Section 4 to better illustrate how the AAS acts as a Digital Twin (Section 5) and which role Usage Contracts play (Section 6). We conclude with a discussion on the outlined points in Section 7. 2 Background The proposed approach in this paper relies on the latest specifications for Digital Twins in Industry 4.0, the concept of Data Sovereignty and Data Usage Policy, and Access and Usage Control languages. These topics are briefly summarised in the following. Digital Twins in Industry 4.0 Originally introduced as a simulation-driven virtual representation of space and aircraft vehicles, the focus of Digital Twins has shifted to data interoperability concerns and to serve as a foundation for ex- changing comprehensive data models of a nearly any kind of physical assets. As this idea has gained a lot of attention, uncountable approaches, models and vari- ation appeared in the recent years. Worth mentioning are however the proposals of the W3C working group Web of Things [4], the Digital Twin as described by the Industrial Internet Consortium [5], and the Asset Administration Shell specified by the Plattform Industrie 4.0 [2]. All three approaches are promoted by large communities and therefore comprise a sufficiently wide-spread consent. We have selected the Asset Administration Shell as the Digital Twin speci- fication because the data model has now, with version 2.0, reached a sufficient maturity level, the specification contains clear implementation instructions and the security model is defined as an integral part of the metamodel. In particular, Towards Integrated Data Control for Digital Twins in Industry 4.0 3 the data constraint statements enable the expressing of many required constructs and therefore form a suitable foundation for the following concepts. Data Sovereignty In current business interactions, permissions and obliga- tions are declared through textual contracts. Wherever a formal, legally binding agreement needs to be documented, lawyers are required to express the intended meaning in written form. This is not suitable for the data-driven Industry 4.0, as interactions between organisations form on the fly, dynamically and evolve and dissolve quickly. In addition, the relation between the involved organisations needs to be re- flected by the technical implementations. Currently, arrangements between busi- ness partners rely on responsible human actors, which are trusted by the opposite party to treat their assets according to the previously concluded agreements. In case of violations, the textual contracts and the legislative system serve as es- calation and disciplining stages. The interaction speed and data volume of the regarded scenarios, however, limit the monitoring capability of the involved hu- mans, therefore restricting their options to control the data processing processes. The solution is to demand the implementation of data restrictions directly as part of the respective systems and, as far as this paper is concerned, into the Digital Twins. The outlined situation is slightly different for person-related data, espe- cially in member countries of the EU. The General Data Protection Regulation (GDPR) defines certain rights and obligations for digital information related to humans. Still, the relevant data sets of Industry 4.0 do usually refer to machine to machine communication and, therefore, are not in the scope of GDPR laws. As no other legislative option exists to enforce control on digital information, respective agreements have to be established on a case-by-case basis. In the following, we refer to contracts when talking about legally binding agreements, which usually appear in written, natural language form. In contrast to these human-readable contracts, policies, are understood as formally modelled descriptions: Definition 1. A Data Usage Policy is machine-readable representation of an agreement between two legal entities, exactly one assigner and one assignee, defining the permissions on a defined data artefact. Policies are serialised in a common data format (e.g. XML or JSON) and use shared vocabularies to unambiguously outline their intentions. Note that in general more than two parties can participate in a policy. We intentionally leave this and other extensions open for future work. It is also im- portant to understand that Data Usage Policies, as defined here, have currently no legally binding power. A binding agreement still requires textual contracts. Policies however omit the intended blurriness of legal clauses and need to be objectively decidable. Contracts on the other hand must be interpreted based on their context and the prevailing legal understanding of the contained clauses. The challenge is therefore to translate the established patterns of textual con- tracts into the digital world, and to create an equally recognised level of trust. 4 Bader and Maleshkova 3 Related Work As stated, several frameworks and guidelines have targeted the formulation, ex- change and implementation of Digital Twins but also data restriction policies. The terminology of permissions, obligations, and conditions introduced by the UCONABC [8] usage control model has been adopted by nearly all later models. In combination with RFC 2904 [9] and the introduction of the different pol- icy points, the theoretical foundation of usage control systems and architectures are defined. However, none of them proposes a vocabulary to specify distinct permissions or prohibitions, their focus is rather on classifications and concep- tualization. This issue is, to some degree, covered by XACML [6]. Still, XACML only focuses on access control, not on the more holistic usage control. XACML applies very well in Attribute-based Access Control (ABAC) sce- narios. The object refers to the attribute of the resource under consideration, which a subject wants to access. ABAC rules can be stated in plain text and interpreted by the hosting system, as intended by the AAS metamodel. Yu et al. [10] also show an approach to encode the access permission in cryptographic access key structures, hiding the content also from the hosting service. This is especially relevant if a third party is used as a cloud provider. Nevertheless, while this supports the downstream usage of ABAC rules, this approach is bound to the syntax of the data instead of its meaning. The Data Privacy Vocabulary3 (DPV) provides terms to annotate and cat- egorise instances of legally compliant personal data handling according to the GDPR, including the notions data categories, data controllers, purposes of pro- cessing data, etc. The focus is on the description and annotation of privacy constraints. The Open Digital Rights Language (ODRL) [3] is equally able to express usage concepts through its RDF vocabulary. The specification allows expressive statements but the implications of many supported constructs are not yet sufficiently understood. The challenge is not the description of the poli- cies but their interpretation in an enforcing system. The proposed terms lack a sufficient definition of their context, side-effects and implicit dependencies. The IDS regards the secure and trustworthy data exchange on a data-centric, domain-agnostic level. The Reference Architecture Model [7] consists of layers to establish interoperability and crosscutting perspectives for reaching its main target, to ensure end-to-end data sovereignty. The syntactic interoperability is accomplished by the IDS Connectors as a core gateway to the IDS, with stan- dardised interfaces and exchange protocols. An IDS Connector is a hosting sys- tem for any kind of data, for instance also for AAS, and ensuring the interests of Data Owners as expressed in formal Contracts. The IDS specification is thereby defining a data protecting infrastructure and requirements for the interacting systems, while the AAS further outlines the endpoints and data model of the specific Digital Twins living in such an infrastructure. The Policy Language it- self has already been presented for general data resources [1] but went recently through major rework in order to sharpen the Usage Control clauses. 3 https://www.w3.org/ns/dpv Towards Integrated Data Control for Digital Twins in Industry 4.0 5 Fig. 1. Example collaboration network. The AAS is forwarded from left to right. 4 Scenario of Digital Twins in Industry 4.0 The scenario in this section serves as a running example to outline the ideas and approaches for an integrated Usage Control of a Digital Twin in an industrial setting (cf. Fig. 1). A Manufacturer collects static master data together with sensor observations of an operating device inside an AAS. It mandates a Data Analyst to access the AAS instance and come up with performance KPIs and failure predictions in order to optimise its production processes. The Manufac- turer also is willing to share these insights contained in the Data Analyst’s copy (AAS’) with its Business Partner, as early information on potential breakdowns directly affects their just-in-time supply chain. It is however crucial for the Man- ufacturer to prohibit any access of other customers of the Data Analyst, as those might be Competitors. Figure 1 outlines the information flow in this simplified setting. The asset, enriched with the AAS to a Digital Twin, provides static master data and dy- namic sensor streams. This interaction is managed by an access control engine deployed directly at the AAS host. The Data Analyst as an intermediary re- quests the data and enriches it with the result of its prediction algorithm. Note that this step results in a newly created AAS’, which is not directly located at the original asset but in the Data Analyst’s server. The uniform representation conforming to the Asset Shell metadata allows the Manufacturer to automati- cally request and understand the AAS’, independently of the data model used internally by the Data Analyst. However – as the AAS’ is now stored at the Data Analyst – the contained information is not under control of the Manufacturer anymore but still contains its critical data. As such, the Data Analyst needs to evaluate the access requests from both the Manufacturer’s Business Partner and the Competitor accordingly. The required instructions and descriptions must be contained in the AAS, and also in the AAS’. 6 Bader and Maleshkova 5 Asset Administration Shell as the Digital Twin The Asset Administration Shell concept is a collection of several specification modules. The data model part specifies the core structure and different elements of the AAS, mainly administrative information about the AAS itself, the as- set, and use case-specific data collected and sorted in so-called Submodels. The serialised data can be transmitted in several data formats, for instance JSON, XML or any RDF serialisation. Another part of the AAS specification targets the interaction in a remote environment. API calls for OPC UA, MQTT and REST (based on HTTP) are currently under development. Another specification targets the infrastructure components in an AAS-driven network. Distinct systems for search and discovery but also identity provision are required. For this challenge, two different aspects need to be distinguished. The identificators of actual assets and their AAS will always be in the authority of their owners, following their company-specific schemes. As the Digital Twin of the asset is intended as a product itself, no manufacturer can be expected to rely on a third party for naming its products. The attributes, properties and values contained in the AAS, however, need to be known to the intended users, otherwise no interoperability can be obtained. Rich and extensive vocabularies such as eCl@ss4 or the Common Data Dictionary (IEC CDD5 ) shall provide the necessary concepts. In our example, the Manufacturer can annotate the sen- sor streams using the eCl@ss property ’0173-1#02-BAJ001#006’. Thereby, the value is fixed to integer and the Data Analyst directly knows that the values have the unit litres per minute (l/min). These approaches, however, only marginally reflect the potential of a compre- hensively web-oriented approach. The catalogues only provide basic identifiers reflected in a taxonomy structure. Hypermedia links or machine-readable an- notations are not provided out of the box. Identifiers have to be dereferenced using catalogue-specific methods. Following the assumption that the Web stack (cf. Ass. 1) is a uniting technology and in place in every Industry 4.0 scenario at some point. Note that this does not mean that non-Web interactions shall be neglected. For instance, in machine-to-machine interactions, HTTP or Web browsers are usually not an appropriate choice. However, all developers, op- erators or any other involved stakeholders is capable to access and exchange Web-based information using the currently available tools, different to any other available technology set. This convenience advantage can not be underestimated since the acceptance by the target community is absolutely crucial for the success of any Industry 4.0 proposal. Assumption 1 Web technologies are the common denominator known to every Industry 4.0 stakeholder. All involved parties are familiar with URIs, HTTP, DNS, and Web Browsers and can use this technology set to establish Industry 4.0 use cases based on it. 4 http://www.eclasscontent.com/ 5 https://cdd.iec.ch/cdd/iec61360/iec61360.nsf Towards Integrated Data Control for Digital Twins in Industry 4.0 7 Linked Data and the Linked Data vocabularies can provide terms and con- cepts with rich annotations and machine-readable relations. Nevertheless, sev- eral reasons still severely hamper the wider adoption of Linked Data-based ap- proaches for Industry 4.0 vocabularies. First, the requirements of industrial ap- plications are long-term and for formal and guaranteed maturity. As legal liabilities arise from the implementation of concepts in productive facilities, a community-based approach such as DBpedia is indefensible. Established and well-reputated agencies need to back-up such a vocabulary, with clearly defined process and decision-criteria. This is in contrast to the less formal procedures currently in place in the Semantic Web community, which is still mostly driven from an academic background. Statement 1 Long-term support and formal liability are crucial factors for the adoption of any digital resource though the manufacturing industry. Preferred are established standardisation agencies such as ISO, IEC, NIST or DIN. The second reason is certainly the separation of communities. Industrial de- velopments are, by their nature, mostly driven and managed by people with an engineering background. Web developers on the other hand do not under- stand the specific requirements or speak the used language appropriately. For instance, using the running example, a software application ran at the Data Analyst can quite easily be updated, relocated or completely replaced. This is a common development for Web services. A physical device or facility needs to stick to safety regulations and certification processes as otherwise people could get harmed. This leads to significantly longer and more complex design and de- cision processes. Combining digital services with physical assets leads to clashes between both approaches and communities. Fortunately, a steady progress can be identified. This is certainly driven by the identified business potential and the wide-spread conviction that neither non-digital devices nor plain software presents a future-proven product. Statement 2 The current solutions proposed by Industry 4.0 consortia hardly reflect the potential of Web technologies. The (Semantic) Web community, on the other hand, needs to reflect the formal requirements of industrial applications and potential harmful consequences. An entity, as understood in this paper, aggregates physical or tangible ob- jects, information resources or digital data objects, software applications and any other identifiable asset. It becomes a Digital Twin when it is extended with a digital form, representing it in digital networks. As we want to examine the AAS as the Digital Twin for the Industry 4.0, we use the following definition: Definition 2. A Digital Twin is the combination of one distinct entity, called Asset, and its digital counterpart. This counterpart consists of the Asset Ad- ministration Shell and several Submodels containing data about the Asset fil- tered according to relevant use cases. 8 Bader and Maleshkova Note that the relation between an Asset and an representing AAS is not necessarily a one-to-one connection. For instance, the device in our example has an assigned AAS with all information for the Data Analyst and another one with relevant data for the Manufacturer’s engineering department. They have different content and different identifiers. That means that not one single Digital Twin exist but rather overlapping sets. Statement 3 As Digital Twins go through their own, but also reflect their As- sets’ life-cycles across companies and phases, one single, universal Digital Twin instance is usually not possible. Therefore, the AAS must be regarded as a frag- mented set of information of the actual Asset. In particular, this implies that the Open World Assumption holds for the AAS. Potential reasoning or other examinations of their content always takes place with incomplete information. This fact is partly regarded by the efforts to standardise Submodels as use case-dependent information carriers, which fix the set of possible attributes and features. All these models and data provisioning needs to be based on a well-defined and consistent identification method. Currently, an incomprehensible set of legacy patterns is used in the domain, challenging a unifying approach. Furthermore, the ability and authority to select own identifiers is an essential characteristic for the public appearance of companies. However, proprietary schemes – sometimes implicitly encoding product families or versions – can lead to misunderstand- ings and errors at downstream services. Following the recommendations of the (Semantic) Web – using URIs – is a proven and technically easily manageable convention. This is formulated by the following assumption: Assumption 2 Every relevant actor in Industry 4.0 has its own internet do- main. A direct mapping between the domain and the related company is always possible, also vice versa. Due to the consideration that every company nowadays needs its own website, the validity of this claim seems reasonable. We furthermore regard an internet domain as a valuable, well-protected resource. Even though one can construct use cases where companies lose control over their domain, this will only happen in very few cases. Consequently, a sufficiently durable namespace for identifiers is directly available for every company. Even though this assumption might be convincing at a first glance, the legal obligations of long-lasting industrial iden- tifiers are not necessarily met yet. This gap however might be resolved through new service providers, guaranteeing their sustainability as a new business model. Assumption 3 Internet domains are maintained over the whole life-cycle of a Digital Twin. A company will not lose control over its domain at any time. Statement 4 Constructing identifiers by concatenating a company’s internet authority with its dedicated product-naming scheme automatically creates globally unique identifiers. The expressiveness of URIs is suitable for transporting this information in a syntactically feasible manner. Towards Integrated Data Control for Digital Twins in Industry 4.0 9 Fig. 2. Stairway of Usage Policy Categories by required formalisation. Statement 5 URIs are the most commonly used identifiers throughout digital applications. Their established dissemination alone makes them superior to any other scheme. Note that the convenience of the target group is again the dominant argument in favour of URIs. While this appears as a non-functional argument, we want to stress the fact that missing dissemination and adoption are the key obstacles of any Digital Twin concept published so far. 6 Policies and Machine-readable Restrictions The expressiveness of the policies does, in general, not depend on the area they are evaluated but on the targeted position in Figure 2. A human operator can formulate and understand complex constructs, easily creating insolvable issues for any AI. An control language stretching an unrestricted space is therefore not beneficial, as it requires direct human intervention each time a policy is regarded. However, in order to cope with most of the currently relevant use cases, we are confident that a small number of formalised dimensions (counting, time, space, membership cf. [1]) is sufficient. Those dimensions need to be unambiguously defined, limit the variety of interpretations and specify implementable logic for their evaluation. While for instance XACML or, as regarded in this paper, the Security module of the AAS and the IDS Usage Contracts provide a structure for data protection rules, their implications for evaluations is not yet sufficiently defined. The assumption re- flects the fact that there should be not only a shared understanding on the syntax of contracts but also their meaning. For our example, the Data Analyst must not only be able to request and receive the AAS but also understand and evaluate the clauses itself later on. While this is certainly solvable in point-to-point sce- narios by simply agreeing on the allowed semantics, a truly federated framework for Industry 4.0 is not reached yet. This brings us to our next postulation, as the Usage Control of the AAS can only be as reliable as the embedding systems: 10 Bader and Maleshkova Fig. 3. Basic model of the discussed AAS. Color-coding and namespace annotations refer to the respective IDS concepts. Towards Integrated Data Control for Digital Twins in Industry 4.0 11 Statement 6 A reliable end-to-end Usage Control scenario for Digital Twins requires trustworthy systems. Their state needs to be verifiable through certifica- tion processes, cryptographic signatures and controlled environments. Figure 3 shows the example expressed as an Asset Administration Shell snip- pet with focus on the description of the usage restrictions. The yellow, top classes represent the actual Digital Twin and the features of interest. According to the metadata model, those are represented by the AssetAdministrationShell and Submodel classes. The core data control sections are outlined, starting with the Security to the AccessControl class (blue), followed by the definition of rele- vant entities and interactions (grey). The red Permission-related classes close the circle and link back to the actual protected features. Note that the same pattern can be expressed through an Usage Contract. The respective classes and properties are directly added but in another namespace (aas vs. ids). The AAS is driven by the understanding of the host as the authority to define security rules. The focus is twofold, (a) to describe the requesting parties (called ’subjects’) and their relations to certain attributes (’objects’). Furthermore, the relevant subcomponents of the control system are explicitly modelled (b). The IDS aims to provide such a controlled, trustworthy ecosystem. While making no difference in terms of the nature of the exchanged data, the IDS Connectors ensure a certain degree of control through certified execution envi- ronments, partly independent of the operating organisation. The IDS therefore locates the definition of those Policy Points in the responsibility of the host- ing system, without any mentioning in the Policy at all. While this behaviour allows for the shipment of both the AAS and the Policies, the interpretation of the described Policy is harder and requires higher degrees of formalisation. For instance, as soon as the AAS’ is evaluated by the Data Analyst, its en- forcement engine needs to interpret the Policy in accordance with its own local environment. This implies the need to be able to independently guess appro- priate Policy Points. This very challenging task is further complicated by the prohibition of direct manual configuration, since the hosting system must ensure the Data Producer’s interests and resist these kinds of manipulations. Statement 7 Derived Digital Twins must contain the original usage constraints. Downstream activities must be compliant to all previously stated restrictions. This is of course difficult to maintain, as at some point in any workflow, the input components merge to a new product, with the assembler (previously consumer) as the new owner and provider. A simple example are the manuals shipped with each component of a machine. The Manufacturer in our example combines not only the device components into its product but also the manuals and safety documentation. Its customers of course do not get a single document set for each and every component. The resulting device’s documentation, even though reusing content from several suppliers, is the property of the Manufac- turer. Defining at which stage a new product appears – and who has the authority over its further use – is obviously a significant challenge. This is especially true for digital data in general and Digital Twins in particular. 12 Bader and Maleshkova 7 Conclusion We have outlined our vision how the merging of Usage Control and Data Sovereignty with the Asset Administration Shell can create an interoperable but protected Digital Twin for industrial purposes. The provided assumptions and statements are intended as starting points for further discussions. We believe that a con- solidation of the thereby affected approaches and concepts is necessary, and a trade-off between formalisation and expressed details on the one hand and adop- tion on the other is indispensable. Still, the demand for more and more autonomously acting systems enforces overhead in terms of data models and implementations. The Usage Policies ex- plained in the AAS show how the different specifications can be combined to a comprehensive interpretation. We have observed that similar ideas and pattern appear in the different communities. The integrated approach as outlined in this paper can therefore also serve as a bridge between the communities. The combi- nation of identification and interaction patterns with the standardisation efforts and domain requirements of manufacturers requires efforts from all parties. The result however has the potential to disrupt the way we regard assets and data in the intersection of the physical and virtual world. References 1. Bader, S., Maleshkova, M.: Towards enforceable usage policies for industry 4.0. In: Proceedings of the 1st Workshop on Large Scale RDF Analytics (2019) 2. Barnstedt, E., Bedenbender, H., Billmann, M., Boss, B., Clauer, E., Fritsche, M., Garrels, K., Hankel, M., Hillermeier, O., Hoffmeister, M., et al.: Details of the Asset Administration Shell: Part 1. Tech. rep., BMWi (2019), Version 2.0 3. Ianella, R., Villata, S.: ODRL Information Model 2.2 (2018), https://www.w3. org/TR/odrl-model/, W3C Recommendation 4. Kaebisch, S., Kamiya, T., McCool, M., Charpenay, V., Kovatsch, M.: Web of Things (WoT) Thing Description (Jan 2020), https://www.w3.org/TR/2020/ PR-wot-thing-description-20200130/, W3C Proposed Recommendation 5. Malakuti, S., van Schalkwyk, P., Boss, B., Sastry, C., Runkana, V., other: Dig- ital Twins for Industrial Applications (2020), https://www.iiconsortium.org/ white-papers.htm, IIC White Paper 6. Moses, T., Anderson, A., Nadalin, A., et al.: eXtensible Access Control Markup Language (XACML) (Dec 2004), http://docs.oasis-open.org/xacml/access_ control-xacml-2_0-core-spec-cd-04.pdf 7. Otto, B., Lohmann, S., Auer, S., Brost, G., et al.: IDS Reference Ar- chitecture Model. IDSA (2019), Version 3.0, available at https://www. internationaldataspaces.org/ressource-hub/publications-ids/ 8. Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Transactions on Information and System Security (TISSEC) 7(1), 128–174 (2004) 9. Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G., et al.: RFC 2904: AAA Authorization Framework. Network Working Group (2000) 10. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM. pp. 1–9. Ieee (2010)