<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Semantic Discovery and Selection of Data Connectors in International Data Spaces</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Danniar</forename><forename type="middle">Reza</forename><surname>Firdausy</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Twente</orgName>
								<address>
									<addrLine>Drienerlolaan 5</addrLine>
									<postCode>7522 NB</postCode>
									<settlement>Enschede</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Patrício</forename><surname>De Alencar</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Twente</orgName>
								<address>
									<addrLine>Drienerlolaan 5</addrLine>
									<postCode>7522 NB</postCode>
									<settlement>Enschede</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Arid Region (UFERSA)</orgName>
								<orgName type="institution">Rio Grande do Norte State University (UERN) Federal University of the Semi</orgName>
								<address>
									<settlement>Mossoró</settlement>
									<region>RN</region>
									<country key="BR">Brazil</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marten</forename><surname>Van Sinderen</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Twente</orgName>
								<address>
									<addrLine>Drienerlolaan 5</addrLine>
									<postCode>7522 NB</postCode>
									<settlement>Enschede</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maria</forename><forename type="middle">Eugenia</forename><surname>Iacob</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Twente</orgName>
								<address>
									<addrLine>Drienerlolaan 5</addrLine>
									<postCode>7522 NB</postCode>
									<settlement>Enschede</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Semantic Discovery and Selection of Data Connectors in International Data Spaces</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">17A6CEA8A62F0C29E0326B50CCC95723</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T07:19+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>International data spaces</term>
					<term>IDS</term>
					<term>ontology</term>
					<term>semantic web</term>
					<term>discoverability</term>
					<term>data sovereignty</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Data sovereignty is the right that individuals and organizations own to control the access to and the disclosure of their private and sensitive data. In Europe, the International Data Spaces Association (IDSA) aims to promote this right by proposing technical and organizational guidelines to help companies build trusted data exchange ecosystems. The IDSA suggests the IDS Connectors as software components necessary to enforce data sovereignty on the technical level. Among many possible functionalities, an IDS Connector could enable (1) data exchange between data owners' and data user's Enterprise systems in a standardized communication protocol; (2) data access policy enforcement; and (3) internal data transformation operations, e.g., integration, mapping, or merging. However, software and service providers may start soon offering IDS Connectors with different configurations through multiple platforms on the Web, making the practical adoption of the IDS architectural guidelines more difficult, especially for small and medium enterprises. We propose developing an IDS Connector Store to discover and select IDS Connectors in IDS ecosystems to cope with this issue. The store will operate as a metadata repository to describe the connectors according to contextual information, e.g., the business domain, pricing model, and data access policies enforced. This paper reports on the current state of this research endeavor by providing a threefold contribution. First, it elaborates on research questions, methods, and goals to address the design problem on hand. Second, it presents an ontology requirements specification document highlighting competency questions related to discovering and selecting IDS Connectors in an IDS ecosystem. Last, it provides the first conceptual draft of an ontology for IDS Connectors described in OntoUML posed for discussion among the conceptual modeling community and to guide meaningful and further specification in Web Ontology Language (OWL).</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>IT-based platforms have proven their significance in facilitating data-sharing and interoperability among organizations <ref type="bibr" target="#b0">[1]</ref>. A few of their benefits perceived by business entities are improving their planning process, enhancing their capability to fulfill large work orders, and stimulating the creation of new business models <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>. Despite these gains, establishing a data-sharing ecosystem has challenges, e.g., conflicting data formats and standards between companies' software systems and the lack of technical enforcement in disclosing sensitive data <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>Proceedings of the Workshop of I-ESA'22, March 23-24, 2022, Valencia, Spain EMAIL: d.r.firdausy@utwente.nl (D.R. Firdausy); p.dealencarsilva@utwente.nl (P. de Alencar Silva); m.j.vansinderen@utwente.nl (M. van Sinderen); m.e.iacob@utwente.nl (M.E. Iacob) ORCID: 0000-0001-9743-9754 (D.R. Firdausy); 0000-0001-6827-1024 (P. de Alencar Silva); 0000-0001-7118-1353 (M. van Sinderen); 0000-0002-4004-0117 (M.E. Iacob) Subsequently, these hurdles in carrying out data exchange led to the advancement of the International Data Spaces (IDS). This initiative is a decentralized and usage policy-enforced datasharing ecosystem that puts forward trust, security, interoperability, and data sovereignty in mind <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. IDS grants the participants access to join and share data in the ecosystem through the IDS Connectors. These software components will be critical to enabling secure data exchange between a data provider and data consumer by enforcing usage policies for the data consumer to use, process, and proliferate the shared data <ref type="bibr" target="#b7">[8]</ref>. As a gateway between a company's enterprise systems and their partners', the IDS Connectors may soon be offered and supplied by software and service providers in numerous configurations to satisfy diverse sets of participants' needs and capabilities. As a result, the information to request these IDS Connectors will be increased in a scattered manner throughout the Web, hampering the potential participants' ability to discover them and ultimately limiting their adoption of the IDS vision. To cope with this issue, we propose the idea of an IDS Connector Storea repository of metadata describing the functionality and contextual information about data connectors.</p><p>In the meantime, Semantic Web technology has gained more prominence in information sharing. It has been implemented in an increasing variety of contexts in recent years to enhance the discoverability and accessibility of resources on the Web <ref type="bibr" target="#b8">[9]</ref>. One of the building blocks that constitute the Semantic Web is Ontology, which is a formal and explicit specification of a concept used to add a layer of metadata to the described resources to define their meaning <ref type="bibr" target="#b9">[10]</ref>. This procedure makes the Web more accessible and understandable for more refined search results by software agents in providing information to human agents. Even though considerable research has adopted the Semantic Web approach, the ones that attempt to cope with the widespread proliferation of the IDS Connectors are still minimal. Therefore, we propose the application of Ontology and Semantic Web technology to the development of the IDS Connector Store to facilitate the discoverability and selection process of the IDS Connectors.</p><p>The organization of the rest of this paper follows. Section 2 will address the question that probes the methodological steps required to develop the ontology for the IDS Connectors. Then, Section 3 elaborates on producing the ontology requirements specification document, highlighting the competency questions related to discovering and selecting the IDS Connectors. Finally, in Section 4 and Section 5, we will present the first conceptual draft of the mentioned ontology described in OntoUML and pose a discussion among the conceptual modeling community to specify the ontology further in Web Ontology Language (OWL).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Research methods</head><p>The first prominent step in developing an ontology-based software application is the formulation of the ontology requirements specification document (ORSD). In this research, we adopt the scenariobased NeON Methodology, emphasizing the reuse of existing ontological and non-ontological resources in developing the ontology <ref type="bibr" target="#b10">[11]</ref>. In addition to the requirements specification activity guidelines, this methodology also provides a template to formulate the ORSD as a filling card that describes the purpose, scope, implementation language, intended end-user, intended uses, requirements, and pre-glossary terms of the ontology under design <ref type="bibr" target="#b11">[12]</ref>. The process followed to produce the ORSD based on this methodology will be discussed in more detail in the next section.</p><p>This paper aims to produce a preliminary ontology for the IDS Connectors to facilitate their discoverability and selection for the IDS participants. To maintain interoperability with the domain reference ontology, NeON suggests a quick search of knowledge resources for possible reuse during the development. For this purpose, the IDSA has published the IDS Information Model that describes the fundamental concepts of the IDS, covering entities from the participants to the infrastructure components <ref type="bibr" target="#b12">[13]</ref>. This IDS Information Model grounds the ontology proposed in this work. The resulting conceptual model is depicted in OntoUML <ref type="bibr" target="#b13">[14]</ref>. This model serves as the basis for further implementation into OWL to describe the IDS Connectors and distinguish them with subjectpredicate-object triples according to the Resource Description Framework (RDF) format <ref type="bibr" target="#b14">[15]</ref>. Through this semantic annotation, several sentences can be formed to explain the IDS Connectors. For instance, company A maintains an IDS Connector X, IDS Connector Y is offered in a flat-rate pricing model, or IDS Connector Y complies with GS1 standards <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>. As a result, software agents will be able to discover the IDS Connectors that are appropriate to their data exchange demands.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">IDS connector ontology requirement specification</head><p>The requirements specification identifies the ontology's purpose, scope, and implementation language. As presented in Table <ref type="table">1</ref>, three main end-users that will take advantage of the knowledge given by the IDS Connector ontology are listed. The business representatives are the first target users due to their interest in spotting potential business opportunities in the current business landscape. For the potential IDS participants, the presence of their partners and the prospect of securing a strategic partnership with other existing participants signal the value accessible to them by participating in the data space. Such a scenario might influence their willingness to consolidate into the IDS ecosystem.</p><p>Conversely, the interests of the existing participants can take many forms. One example is to find other prospective partners to engage in strategic information exchange to leverage their value chain performance. The IT representatives will need to further translate these business strategies to the IT implementation strategies by investigating the suitable IDS Connector matching their needs and capabilities. Such a demand leads to concerns about which IDS Connectors fit their business domain or industrial standards adopted for data exchange. In response, software and service providers will be interested in making their IDS Connectors discoverable by external software applications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1 IDS Connector Ontology Requirement Specification Document Purpose</head><p>To serve the IDS Connector Store as a knowledge base in describing the IDS Connector to guide existing and potential participants of the IDS ecosystem to the relevant IDS Connector.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Scope</head><p>The ontology focuses on describing and discovering the IDS Connectors according to contextual information (e.g., the business domain, pricing model, and enforced data access policy) with the granularity represented by the competency questions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Implementation Language</head><p>The ontology is represented in OntoUML, with further translation into OWL. -Java, Spring Boot, JavaScript, NodeJS, VueJS, Python, etc. -On-Premise, Cloud: SaaS, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Intended End-Users</head><p>The functional and non-functional requirements specification then follows the Ontology Engineering activity. The ontology development work on the IDS itself was initiated by the IDSA by publishing the IDS Information Model. This work grounded the development of this IDS Connector ontology, putting it as a prominent non-functional requirement. On top of this, several functional requirements in the form of competency questions lead to the semantic-enabled discovery and selection process of the IDS Connectors. These questions are grouped by considering the immediate interests of the relevant end-users. Frequent terms are extracted from the competency questions, leading to the enumeration of objects for answering the end user's query. We instantiate the entities listed in Table <ref type="table">1</ref> above by referring to the literature <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b17">18]</ref>, industrial standards <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b18">19]</ref>, IDSA documentation and publications <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b19">20]</ref>, and the publication of the Smart Connected Supplier Network (SCSN), one of the IDS forerunners in the Dutch manufacturing supply chain <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b21">22]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Preliminary IDS connector ontology conceptual model</head><p>Using the IDS Reference Architecture Model (RAM) and the IDS Information Model (IM) as a starting point, we have identified several concepts relevant to answering the CQs above, namely the Participant and the Connector concepts <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b12">13]</ref>. As shown in Figure <ref type="figure" target="#fig_0">1</ref>, we identify the former concept as the IDS Actor and extend it further into two specializations. The Core IDS Actors refers to the participants who either own and provide or request and use data. Meanwhile, the IDS Supporting Actors are associated with parties that ensure the continuation of the data-sharing ecosystem. The Software and Service Provider carries this duty by providing essential components to participate in the data space. Meanwhile, the Broker Service Provider supports the core actors with the function to look up for the other actors and the Connector used by the different actors through the functionality offered by the IDS Connector Store. In addition, the Supporting IDS Actor also covers other roles, such as the Clearing House and Identity Provider. However, as the IDS RAM describes, these roles can be assumed by the same organization that takes the part of the Broker Service Provider <ref type="bibr" target="#b7">[8]</ref>.</p><p>The IDSA expresses the Connectors from several different perspectives. On the one hand, the IDS IM describes the concept of a Connector to be the generalization of the Base Connector, Trusted Connector, App Store, and Participant Information Service <ref type="bibr" target="#b12">[13]</ref>. Here, we distinguish these Connectors into the Core Connector and Supporting Connector, each used by the corresponding type of role. The IDS RAM justifies this distinction by describing that the functions falling into the supporting category, i.e., the App Store Provider, Broker Service Provider, and Identity Provider, rely on the Connector technology to carry out their functions <ref type="bibr" target="#b7">[8]</ref>. On the other hand, the IDS RAM also characterizes the Connector from its Deployment Context, Security Profile, Catalog, and Host. The Deployment Context is designated as the Connector's deployment environment, i.e., on-premises or cloud-based. Security Profile explicates the Connector's capability to enact a secure data exchange and processing environment. Host signals the communication protocol that the Connector supports to expose resources, i.e. HTTPS URLs, MQTT topics, etc. Whereas, the Catalog facilitates the participant discovery in the ecosystem based on the digital resources that the Connector provides or consumes.</p><p>We extend the Connector concept with additional properties to facilitate its discovery and selection. The Business Domain describes the context where the Connector is developed to be specialized. Standards refer to the criteria to which the connector complies. The Pricing Model implies how the end-users are expected to pay for the Connector's usage and acquisition. The Application Framework informs which technology stacks are used to develop and support the Connector's runtime. Finally, the Data Usage Agreement is understood as the contract composed of the Data Usage Policy Pattern and agreed by the interacting Core IDS Actor to govern the data usage. As of now, five types of data usage patterns are supported by the Connector, and more designs may be added in the future.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>This paper introduced a preliminary ontology conceptual model to describe IDS Connectors that will serve as a façade of a Connector Store. Since this ontology is still under development, we plan to refine it further to accommodate more relevant competency questions to facilitate the discovery of IDS Connectors and IDS actors. The next step is to translate this model into OWL representation for semi-automated machine reasoning. Then, we populate the resulting representation with instances of IDS Connectors and IDS Actors and load it into a triple store such as TriplyDB to make it publicly available <ref type="bibr" target="#b22">[23]</ref>. Then, we plan to evaluate the published ontology by translating the competency questions into SPARQL queries to verify the ontology's correctness, consistency, and completeness. Hence, we plan to validate the utility of the ontology by assessing the relevance of the posed competency questions with expert opinion and the end-users identified in Table <ref type="table">1</ref>, besides verifying if the answers returned from the SPARQL correspond to end-users expectations. Lastly, the completed and published ontology will be operationalized into a proof-of-concept implementation of the IDS Connector Store by connecting the triple store with a user-interfacing application to support the discovery and selection of IDS Connectors in an IDS-compliant data-sharing ecosystem.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Preliminary IDS Connector Ontology Conceptual Model</figDesc><graphic coords="5,72.00,72.00,451.00,269.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>User 1. Business representatives of potential and existing IDS participants User 2. IT representatives of potential and current IDS participants User 3. Software and Service Providers who develop and supply IDS Connectors User 4. Scholars who are keen to explore the ontology's knowledge representation capabilities</figDesc><table><row><cell cols="2">Functional Requirements: Competency Questions</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">CQG1. IT Representatives</cell><cell></cell><cell></cell></row><row><cell cols="2">CQ 1. What software provider offers IDS Connectors?</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="4">CQ 2. Which IDS Connectors are developed for a specific business domain?</cell><cell></cell></row><row><cell cols="4">CQ 3. Which IDS Connectors are complying with a particular standard?</cell><cell></cell></row><row><cell cols="3">CQ 4. Which IDS Connectors are offered in this pricing model?</cell><cell></cell><cell></cell></row><row><cell cols="4">CQ 5. Which IDS Connectors support these data usage agreements?</cell><cell></cell></row><row><cell cols="6">CQ 6. Which IDS Connectors are developed using this application development framework?</cell></row><row><cell cols="4">CQ 7. Which IDS Connectors are offered in this deployment context?</cell><cell></cell></row><row><cell></cell><cell cols="2">CQG2. Business Representatives</cell><cell></cell><cell></cell></row><row><cell cols="6">CQ 8. Which IDS participants use a particular IDS Connector from a specific Software Provider?</cell></row><row><cell cols="4">CQ 9. Which IDS participants operate in a particular business domain?</cell><cell></cell></row><row><cell cols="4">CQ 10. Which IDS participants comply with a particular standard?</cell><cell></cell></row><row><cell>Pre-Glossary of Terms</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Terms from Competency Questions &amp; Frequency</cell><cell></cell><cell></cell><cell></cell></row><row><cell>-IDS Connector</cell><cell>-Business Domain</cell><cell></cell><cell cols="3">-Data Usage Agreement</cell></row><row><cell>-Participant</cell><cell>-Standards</cell><cell></cell><cell>-Technology</cell><cell></cell></row><row><cell>-Software Provider</cell><cell>-Pricing Model</cell><cell></cell><cell cols="2">-Deployment</cell></row><row><cell>Objects and Terms for Answers</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>-Gatewise IDS Connector,</cell><cell cols="2">-Transport Logistics, Glass</cell><cell>-Delete</cell><cell>After</cell><cell>Interval</cell></row><row><cell>Supplydrive IDS Connector,</cell><cell>Manufacturing,</cell><cell>Steel</cell><cell>Agreement,</cell><cell></cell><cell>Connector-</cell></row><row><cell>TradeCloud IDS Connector.</cell><cell>Manufacturing, etc.</cell><cell></cell><cell>restricted</cell><cell></cell><cell>Agreement,</cell></row><row><cell>-Vandaglas B.V., Van Egmond</cell><cell cols="2">-OTM, GS1, EDI4STEEL, etc.</cell><cell cols="3">Logging Agreement, etc.</cell></row><row><cell>Groep, Meijer Metal</cell><cell cols="2">-Flat Rate, Freemium, Pay</cell><cell></cell><cell></cell></row><row><cell>-ECI Software Solutions,</cell><cell cols="2">per User, Pay per Feature,</cell><cell></cell><cell></cell></row><row><cell>Tradecloud</cell><cell>etc.</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Intended Uses</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="6">Use 1. Software and Service Providers publish their offered IDS Connectors' metadata on the IDS</cell></row><row><cell cols="4">Connector Store to make their offered IDS Connectors discoverable.</cell><cell></cell></row><row><cell cols="6">Use 2. Business representatives search for IDS-compliant partners operating in the same</cell></row><row><cell cols="4">business domain, complying with common standards, etc.</cell><cell></cell></row><row><cell cols="6">Use 3. IT representatives search for IDS Connectors that match their needs and capabilities.</cell></row><row><cell cols="6">Use 4. Scholars search for, use, and import the ontology into their proof-of-concept IDS</cell></row><row><cell>implementations.</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Ontology Requirements</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Non-Functional Requirements</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>NFR 1.  The ontology must at least use English NFR 2. The ontology must comply, reuse and integrate with the existing IDS Ontology specified under the IDS Information Model.</note></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Acknowledgements</head><p>This research is financially supported by the Dutch Ministry of Economic Affairs and co-financed via TKI DINALOG and NWO. The CLICKS project has granted funding for this work (grant no. 439.19.633). CLICKS is the acronym for Connecting Logistics Interfaces, Converters, Knowledge, and Standards. The authors thank the involved consortium partners for their support and the anonymous reviewers for their constructive feedback.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Going concerns: The governance of interorganizational coordination hubs</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Markus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">N</forename><surname>Bui</surname></persName>
		</author>
		<idno type="DOI">10.2753/MIS0742-1222280407</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Management Information Systems</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="163" to="198" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">E-business infrastructure for supporting the integration of tourist services</title>
		<author>
			<persName><forename type="first">M</forename><surname>Banek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Juric</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pintar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Skocir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vranic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Vrdoljak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2008 50th International Symposium ELMAR</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="289" to="292" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">CPSP: A Cloud-based Production Service Platform Supporting Co-Manufacturing of Cross-Enterprise</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Jin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhao</surname></persName>
		</author>
		<idno type="DOI">10.1109/CSCWD.2018.8465354</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD)</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="455" to="460" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The road to European digital sovereignty with Gaia-X and IDSA</title>
		<author>
			<persName><forename type="first">A</forename><surname>Braud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Fromentoux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Radier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">Le</forename><surname>Grand</surname></persName>
		</author>
		<idno>doi: 0.1109/MNET.2021.9387709</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Network</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="4" to="5" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">The use of GS1 standards to improve the drugs traceability system in a 3PL Logistic Service Provider</title>
		<author>
			<persName><forename type="first">I</forename><surname>Lopes-Martínez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Paradela-Fournier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rodríguez-Acosta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Castillo-Feu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Gómez-Acosta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cruz-Ruiz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">DYNA</title>
		<imprint>
			<biblScope unit="volume">85</biblScope>
			<biblScope unit="page" from="39" to="48" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Dalmolen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Bastiaansen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Somers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Djafari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kollenstart</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Punter</surname></persName>
		</author>
		<ptr target="https://repository.tno.nl/islandora/object/uuid%3Ab2e6952a-06ed-46e1-b186-fc25932b28c3" />
		<title level="m">Maintaining control over sensitive data in the Physical Internet: Towards an open, service oriented, networkmodel for infrastructural data sovereignty</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Designing a multi-sided data platform: findings from the International Data Spaces case</title>
		<author>
			<persName><forename type="first">B</forename><surname>Otto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jarke</surname></persName>
		</author>
		<idno type="DOI">10.1007/s12525-019-00362-x</idno>
	</analytic>
	<monogr>
		<title level="j">Electronic Markets</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="561" to="580" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="https://internationaldataspaces.org/wp-content/uploads/IDS-Reference-Architecture-Model-3.0-2019.pdf" />
		<title level="m">IDSA Reference Architecture Model Version 3.0</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>International Data Spaces Association</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Why the data train needs semantic rails</title>
		<author>
			<persName><forename type="first">K</forename><surname>Janowicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Van Harmelen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Hendler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI Magazine</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="5" to="14" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Ontology and Semantic Web in Logistic Applications: State of the Art</title>
		<author>
			<persName><forename type="first">S</forename><surname>Salma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bouneffa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Habiba</surname></persName>
		</author>
		<idno type="DOI">10.1109/CMT.2019.8931374</idno>
	</analytic>
	<monogr>
		<title level="m">2019 7th Mediterranean Congress of Telecommunications (CMT)</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">NeOn methodology for building ontology networks: a scenario-based methodology</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Suárez-Figueroa</surname></persName>
		</author>
		<ptr target="https://oa.upm.es/5475/1/INVE_MEM_2009_64399.pdf" />
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">How to write and use the ontology requirements specification document</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Suárez-Figueroa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Villazón-Terrazas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OTM Confederated International Conferences&quot; On the Move to Meaningful Internet Systems</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="966" to="982" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><surname>Idsa</surname></persName>
		</author>
		<ptr target="https://github.com/International-Data-Spaces-Association/InformationModel" />
		<title level="m">The International Data Spaces (IDS) Information Model</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Ontological foundations for structural conceptual models</title>
		<author>
			<persName><forename type="first">G</forename><surname>Guizzardi</surname></persName>
		</author>
		<ptr target="https://ris.utwente.nl/ws/portalfiles/portal/6042428/thesis_Guizzardi.pdf" />
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The semantic web</title>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hendler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lassila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific american</title>
		<imprint>
			<biblScope unit="volume">284</biblScope>
			<biblScope unit="page" from="34" to="43" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<ptr target="https://www.gs1.org/industries/transport-and-logistics" />
		<title level="m">GS1 Transport &amp; Logistics</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
		<respStmt>
			<orgName>GS1</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">What is the Open Trip Model?</title>
		<author>
			<persName><surname>Opentripmodel</surname></persName>
		</author>
		<ptr target="https://www.opentripmodel.org/page/about" />
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">An architecture and common data model for open data-based cargo-tracking in synchromodal logistics</title>
		<author>
			<persName><forename type="first">W</forename><surname>Bol Raap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M.-E</forename><surname>Iacob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Sinderen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Piest</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">OTM Confederated International Conferences&quot; On the Move to Meaningful Internet Systems</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="327" to="343" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">V</forename><surname>Inad Industrie Software</surname></persName>
		</author>
		<author>
			<persName><surname>Edi4steel</surname></persName>
		</author>
		<ptr target="https://www.edi4steel.eu/about/" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="https://github.com/International-Data-Spaces-Association/DataspaceConnector" />
		<title level="m">Dataspace Connector</title>
				<imprint>
			<publisher>IDSA</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Scalability and agility of the Smart Connected Supplier Network approach</title>
		<author>
			<persName><forename type="first">C</forename><surname>Stolwijk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Berkers</surname></persName>
		</author>
		<ptr target="https://repository.tudelft.nl/islandora/object/uuid%3A36745cb0-3d5f-4f79-9034-93e02e80529c" />
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><surname>Scsn</surname></persName>
		</author>
		<ptr target="https://broker.ids.smart-connected.nl/#home" />
		<title level="m">Smart-Connected Supplier Network (SCSN) Addressbook</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">The Netowrk Effect for your Data</title>
		<author>
			<persName><surname>Triplydb</surname></persName>
		</author>
		<ptr target="https://triply.cc/" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
