<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Semantic Policy Language for Usage Control</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ines</forename><surname>Akaichi</surname></persName>
							<email>ines.akaichi@wu.ac.at</email>
							<affiliation key="aff0">
								<orgName type="department">Institute for Information Systems &amp; New Media</orgName>
								<orgName type="institution">Vienna University of Economics and Business (WU)</orgName>
								<address>
									<settlement>Vienna</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sabrina</forename><surname>Kirrane</surname></persName>
							<email>sabrina.kirrane@wu.ac.at</email>
							<affiliation key="aff0">
								<orgName type="department">Institute for Information Systems &amp; New Media</orgName>
								<orgName type="institution">Vienna University of Economics and Business (WU)</orgName>
								<address>
									<settlement>Vienna</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Semantic Policy Language for Usage Control</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">62C41D212CCEC9C6C48FAB9EE03D5484</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T03:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Usage Control</term>
					<term>Policy Specification</term>
					<term>Semantic Web</term>
					<term>Knowledge Representation Orcid 0000-0002-6020-5572 (I. Akaichi); 0000-0002-6955-7718 (S. Kirrane)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Usage control involves the encoding and enforcement of policies regarding future data use in the areas of data protection, intellectual property management, and secrets management. Proposed policy languages are either too specific or too general in their ability to express usage policies. In this paper, we propose the Usage Control Policy language and show how we can encode usage control specific requirements using deontic rules and fine-grained conditions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Modern decentralized solutions, such as the Internet of Things (IoT) and distributed knowledge graph applications, face a variety of legislative challenges (e.g, data protection legislation and copyright legislation) regarding data and digital asset management. In addition, according to Pretschner et al. <ref type="bibr" target="#b0">[1]</ref>, data owners are reluctant to share their data with decentralized solutions, as often they have no control over how their data are used. Technologies that aim to address these challenges, which are usually classified as usage control, aim to ensure that data consumers handle data according to usage policies stipulated by data owners.</p><p>Herein, we focus on policy-based usage control, in the context of which we use machinereadable policies to express the requirements for future data usage and mechanisms to enforce the respective usage policies. These policies need to be able to encode normative statements, mainly permissions (respectively prohibitions) and obligations (respectively dispensations) related to the use of data. The different deontic constructs can specify the conditions in which data may be used or in which actions need to be taken.</p><p>Various semantic policy languages have been proposed that could potentially be suitable for expressing usage control, as they support deontic concepts in their core design. The Open Digital Rights Language (ODRL) 1 was originally proposed to express licenses. In addition, attempts have been made to generalize the ODRL model to express other policies <ref type="bibr" target="#b1">[2]</ref>, such as data protection according to the General Data Protection Regulation (GDPR). ODRL allows constraints to be expressed as simple assertions that can also be combined using logical operators (e.g., and, or). However, ODRL and existing derivatives do not provide concrete guidance for the specification of granular semantic conditions such as temporal (e.g., on a monthly or hourly basis), spatial (e.g., on an organizational or country level), cardinality and similar conditions that are needed to express usage policies. Although, Rei <ref type="bibr" target="#b2">[3]</ref> can be used to encode general policies (e.g., access control, privacy, conversation, etc.), as per ODRL, Rei does not support fine-grained conditions and relies primarily on existing domain ontologies to express conditions.</p><p>In this paper, we build on these two policy languages to propose a first version of the Usage Control Policy language (UCP) that is built on top of domain independent ontologies that feature deontic concepts and fine-grained constraints governing the use of data. Additionally, our language has support for classes of enforcement that are derived from deontic concepts and which are important for making correct policy decisions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Use Case</head><p>Our use case is inspired from the IoT domain pertaining to a smart city, where residents make use of multiple smart objects, such as smart homes, cars, parking lots, etc. We assume that marketing companies are interested in the data produced by these smart objects in order to revise new or adjust existing marketing strategies. Thus, the manufacturers of these objects may host or use data sharing platforms whereby data resulting from the use of smart objects are shared with both their customers and various third parties. Consequently, these platforms could offer subscribers the ability to download data relating to smart objects or their users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The UCP Language</head><p>In this initial version of the UCP language, we focus on supporting the encoding of simple usage policies that could be used for ex-ante compliance checking, for instance. Other approaches to policy compliance checking may be the use of an ex-post approach. In the former approach, we assume that marketing companies encode their usage request in a knowledge graph and submits this request to the usage control framework, which is provided by the manufacturers and is responsible for determining if usage is permitted, prohibited, or if usage is subject to specific obligations that need to be fulfilled by marketing companies. This is performed by looking for exact matches or matches that are based on simple subsumption reasoning between the subjects, objects, actions, and constraints of the usage policy and the usage request. A Core Model for Usage Control. Our model design is informed by our extensive literature review regarding the specification and enforcement of usage control policies <ref type="bibr" target="#b3">[4]</ref> and the work of <ref type="bibr" target="#b1">[2]</ref> and <ref type="bibr" target="#b2">[3]</ref>. In Figure <ref type="figure" target="#fig_0">1</ref>, we present the core model of our policy language, which is based on deontic constructs that allow policies to be expressed as what an entity can/can not do and should/should not do with the data in terms of actions. In the proposed model, a Policy is made up of a set of Rules that encode Permissions, Prohibitions, Obligations, or Dispensations. Each Rule is associated with an Action that is performed by a Subject on a target Object. A Rule, a Subject, an Object, and an Action can also be constrained by one or more Constraints.</p><p>In addition, the model supports nested rules that can express nested requirements, which are needed to encode regulatory requirements, such as those set forth by the GDPR <ref type="bibr" target="#b1">[2]</ref>.</p><p>Usage Actions and Constraints. Following the approach proposed by Kagal et al. <ref type="bibr" target="#b2">[3]</ref>, Action has two subclasses: speech acts and domain actions. Speech acts allow conversation policies between agents to be described, among other things. Whereas, Domain actions are actions on the objects in the domain. In our context, we replace speech acts by UsageActions, which will allow usage control specific actions to be described, also called classes of enforcement. Classes of enforcement are actions that can prevent undesired system events by changing the behavior of a system. According to our survey on usage control <ref type="bibr" target="#b3">[4]</ref>, there could be up to six different classes of enforcement, which we present in Figure <ref type="figure" target="#fig_1">2</ref>. Permission and Inhibition allow or prohibit requests for data usage; Revocation revokes access in the event of policy violations or revocation of consent; Delay delays an attempted usage request until the corresponding obligations are fulfilled; Update modifies certain data values after access is granted in order to protect data privacy; and Execution executes actions such as sending notifications to data owners.</p><p>Following the approach in <ref type="bibr" target="#b2">[3]</ref>, Contraint has two subclasses: DomainConstraint and BooleanConstraint. DomainConstraint describes simple assertions from the domain. While, BooleanConstraint allows constraints to be joined together with operators, AND,OR and NOT, to create complex constraints. We extend Constraint by adding the class UsageConstraint. The new class allows usage specific constraints to be expressed, i.e, under which conditions data can be accessed/used. Based on existing literature <ref type="bibr" target="#b0">[1]</ref>, few usage control constraints are already identified, such as temporality, geolocation, purpose, and cardinality, as we show in Figure <ref type="figure" target="#fig_1">2</ref>. We plan to enhance the expressiveness of these constraints by including other ontologies and vocabularies that can express the different classes with increased granularity.</p><p>A Model Instantiation. In the following, we demonstrate how to use our proposed Usage Control Policy Language to express examples of policies (P) inspired by our use case. We assume that usage policies could be expressed by the manufacturers and/or the users of the smart objects in order to inform marketing companies under what conditions the data produced can be used. In order to encode our policy examples, we use the Turtle syntax.<ref type="foot" target="#foot_1">3</ref> P1. Only subscribed marketing companies are allowed to download power consumption data. They must keep the downloaded data for a maximum of 6 months. This policy can be described as a rule that is linked to a deontic permission (that includes a nested rule obligation), a constraint (a subscribed marketing company), a subject (the marketing company), an object (power consumption data), and an action (to download). To encode this policy, we begin by expressing a simple permission describing the right to download data by a marketing company. &lt;http://example.com/mcp#Perm_MarketingCompDownloading&gt; a &lt;http://example.com/ucp#Permission&gt; .</p><p>The constraint that describes a subscribed marketing company is a domain constraint that we define as an RDF statement, which is matched with the knowledge graph that describes the marketing company. The obligation to store data for a limited period of time is described as follows. &lt;http://example.com/mcp#Oblig_MarketingCompStoring&gt; a &lt;http://example.com/ucp#Obligation&gt; .</p><p>The obligation involves a time constraint describing the limited duration for storing data. &lt;http://example.com/mcp#For6Months&gt; a &lt;http://example.com/ucp#TemporalConstraint&gt;.</p><p>The storing duration is expressed using the OWL-Time<ref type="foot" target="#foot_2">4</ref> concepts: TemporalEntity and GeneralDurationDescription.</p><p>In our model, time:TemporalEntity and ucp:TemporalConstraint can be modeled using the owl:sameAs property. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion and Future Work</head><p>In this paper, we proposed the UCP language, used to express usage control policies. In future work, we plan to examine the suitability of several fine-grained conditions that we have mentioned in this paper. In addition, we plan to introduce the states of deontic concepts into our model, for example to monitor the life cycle of obligations in order to check whether they are fulfilled or not by the end users. More generally, we aim to study the expressiveness requirements of various obligations and conditions and how they can be efficiently structured into various Description Logic policy profiles with well understood semantics and complexity.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: A Core Model for Usage Control Policy Language 2</figDesc><graphic coords="2,127.56,84.19,340.15,102.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: An Instantiation of Usage Control Constraints and Actions 2</figDesc><graphic coords="3,134.65,84.19,325.98,79.37" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>The permission rule, which encapsulates the above definitions, is described as follows.The obligation clause that is associated with the permission is described with the following rule. Subscribed marketing companies are allowed to download power consumption data for aggregation purposes only. The encoding of the respective permission follows the same pattern as for the other policy. In this policy, the constraint is a PurposeConstraint that is encoded as a simple assertion.</figDesc><table><row><cell>&lt;http://example.com/mcp#Rule_MarketingCompStoring&gt;</cell></row><row><cell>a &lt;http://example.com/ucp#Rule&gt; ;</cell></row><row><cell>ucp:subject &lt;http://example.com/mcp#MarketingCompany&gt; ;</cell></row><row><cell>ucp:object &lt;http://example.com/mcp#PowerConsumptionData&gt; ;</cell></row><row><cell>ucp:constraint &lt;http://example.com/mcp#For6Months&gt; ;</cell></row><row><cell>ucp:action &lt;http://example.com/mcp#ActionMarketingCompStoring&gt; ;</cell></row><row><cell>ucp:deontic &lt;http://example.com/mcp#Oblig_MarketingCompStoring&gt; .</cell></row><row><cell>The permission is further linked to the associated obligation rule.</cell></row><row><cell>&lt;http://example.com/mcp#Perm_MarketingCompDownloading&gt;</cell></row><row><cell>ucp:nestedRule &lt;http://example.com/mcp#Rule_MarketingCompStoring&gt; .</cell></row><row><cell>&lt;http://example.com/mcp#For6Months&gt;</cell></row><row><cell>time:hasDurationDescription &lt;http://example.com/mcp#Duration6Months&gt; .</cell></row><row><cell>&lt;http://example.com/mcp#Duration6Months&gt;</cell></row><row><cell>a &lt;http://www.w3.org/2006/time#GeneralDurationDescription&gt; ;</cell></row><row><cell>time:months 6.0 .</cell></row><row><cell>&lt;http://example.com/mcp#Rule_MarketingCompDownloading&gt;</cell></row><row><cell>a &lt;http://example.com/ucp#Rule&gt; ;</cell></row><row><cell>ucp:subject &lt;http://example.com/mcp#SubscribedMarketingCompany&gt; ;</cell></row><row><cell>ucp:object &lt;http://example.com/mcp#PowerConsumptionData&gt; ;</cell></row><row><cell>ucp:action &lt;http://example.com/mcp#ActionMarketingCompDownloading&gt; ;</cell></row><row><cell>ucp:constraint &lt;http://example.com/mcp#IsSubsribed&gt; ;</cell></row><row><cell>ucp:deontic &lt;http://example.com/mcp#Perm_MarketingCompDownloading&gt; .</cell></row></table><note>P2. &lt;http://example.com/mcp#ConstraintUsagePurposes&gt; a &lt;http://example.com/ucp#PurposeConstraint&gt; ; ucp:usageConstraint &lt;http://example.com/mcp#AggregationPurposes&gt; .</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">Green: concepts from<ref type="bibr" target="#b2">[3]</ref>; Blue: concepts from<ref type="bibr" target="#b1">[2]</ref>; Orange: our contribution</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_1">The respective namespaces are used to identify our UCP ontology ucp:&lt;http://example.com/ucp#&gt;; the marketing company policy (MCP) onotlogy mcp:&lt;http://example.com/mcp#&gt;; the time ontology time:&lt;http://www.w3.org/2006/time#&gt;; and the owl ontology owl:&lt;http://www.w3.org/2002/07/owl#&gt;.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_2"><ref type="bibr" target="#b3">4</ref> OWL-Time, https://www.w3.org/TR/owl-time/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work is partially funded under the Marie Skłodowska-Curie grant agreement No 860801 and FWF together with netidee SCIENCE programmes as project number V 759-N.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Distributed usage control</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pretschner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hilty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Basin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Vos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Padget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</author>
		<title level="m">Odrl policy modelling and compliance checking</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A policy based approach to security for the semantic web</title>
		<author>
			<persName><forename type="first">L</forename><surname>Kagal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Finin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Joshi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -ISWC 2003</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Akaichi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/2203.04800" />
		<title level="m">Usage control specification, enforcement, and robustness: A survey</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
