A Survey of Dataspace Connector Implementations Tobias Dam, Lukas Daniel Klausner, Sebastian Neumaier and Torsten Priebe St. Pölten University of Applied Sciences, Austria Abstract The concept of dataspaces aims to facilitate secure and sovereign data exchange among multiple stake- holders. Technical implementations known as “connectors” support the definition of usage control policies and the verifiable enforcement of such policies. This paper provides an overview of existing literature and reviews current open-source dataspace connector implementations that are compliant with the International Data Spaces (IDS) standard. To assess maturity and readiness, we review four implementations with regard to their architecture, underlying data model and usage control language. Keywords dataspaces, connectors, data exchange, usage control, policy enforcement 1. Introduction Dataspaces are a concept that is gaining attention from industry and research communities worldwide. It serves as an abstraction for data management in situations where multiple stakeholders exchange data with each other. The idea is that the easy exchange of data between stakeholders generates value, particularly when combined with data analytics. New trading mechanisms are meant to enable stakeholders to cooperate with each other based on the value of the exchanged data and analytics services. For example, in a smart city scenario, a public transportation company and local businesses might participate in a dataspace where businesses benefit from improved retail demand predictions and the transportation company can optimize traffic management. This, however, requires a data management architecture which allows sharing the participants’ data under well-defined and strictly controlled usage policies. Therefore, the goal of dataspaces is to allow members to share data offers and transfer data while keeping control over its use. Control in the context of dataspaces relates to four requirements: (i) participants remains in sovereign control of their identity; (ii) participants decide who to trust; (iii) participants decide on the usage policies under which the data is shared; (iv) participants remain in control of their deployment. Within the overall architecture of a dataspace (cf. Figure 1), the technical implementations of these requirements are called “connectors”, trustworthy software components that support the definition of usage control policies and the verifiable enforcement of such policies. The idea is that these connectors provide the capabilities to automate the connection, the contract ITADATA2023: The 2nd Italian Conference on Big Data and Data Science, September 11–13, 2023, Naples, Italy $ tobias.dam@fhstp.ac.at (T. Dam); mail@l17r.eu (L. D. Klausner); sebastian.neumaier@fhstp.ac.at (S. Neumaier); torsten.priebe@fhstp.ac.at (T. Priebe)  0000-0002-2463-5831 (T. Dam); 0000-0003-3650-9733 (L. D. Klausner); 0000-0002-9804-4882 (S. Neumaier); 0000-0001-9282-2535 (T. Priebe) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings negotiation, and the policy enforcement of data transfers in dataspaces. They therefore act as logical gatekeepers that integrate into each participant’s infrastructure and communicate with each other. While there are also additional services and components that are necessary for a dataspace ecosystem (such as the identity provider), the connectors are intended to be the central technical component. Efforts to build dataspaces are currently led by Gaia-X [1] and the International Data Spaces Association (IDSA) [2]; the synergies between these two are receiving broad attention in Europe and beyond. Furthermore, there are other initiatives currently working on developing the necessary building blocks and infrastructure. With the proliferation of dataspaces initiatives and the increase in both their memberships and implementations, it has become increasingly difficult to follow the underlying technical developments of these systems. The goal of this paper is to highlight the two main challenges that the dataspaces initiatives currently face: (i) the lack of a common definitions for dataspaces and their core components (the connectors), which can impede interoperability, and (ii) the potential lack of reusable core components, which could lead to divergent implementations and waste of effort. In this article, we provide a study of existing developments and implementations for building dataspaces. Our work is motivated by a general, increasing interest in these technologies which is, as indicated above, also foreseeable to prevail for the next few years. In summary, the key contributions of our work are as follows: • We provide an overview of the existing literature on the origins, existing definitions and technical foundations of dataspaces. • We survey existing open-source implementations of dataspace connectors with regard to their architecture, underlying data model and usage control support. In this survey we focus on IDS-compliant implementations. • We point out the surprisingly bad state of documentation for major open-source dataspace connectors, which runs the risk of being a major hindrance to uptake, further development and collaboration/interconnection between different technologies. The remainder of this paper is organized as follows: We review existing literature in Section 2; the survey of existing open-source dataspace connectors is in Section 3. Finally, we conclude with our main results and an outlook on future work in Section 4. 2. Background and Related Work The initial and most significant development was the foundation of the International Data Spaces Association (IDSA), originally launched by the Fraunhofer Society in 2015. The non- profit association has developed a reference architecture [3] and an information model [2], and provides tools and resources for implementing dataspaces (including a connector discussed in Section 3.1). The work of the IDSA has been published in a number of articles [4, 5, 2, 6] and in a comprehensive open-access book [7]. Another notable development in the field of dataspaces is the Eclipse Dataspace Connector (EDC) project. The EDC is being developed and published as an open-source solution at the Eclipse Foundation. The goals of the EDC initiative include a concrete implementation of the Connector Data Source Data Sink Meta Connector data Connector Data Meta App App Meta Clearing House Identity Provider App Store Metadata Broker Figure 1: Interactions between the connectors and the other components in an IDS ecosystem, according to the IDS Reference Architecture [3]. IDS standard protocols and alignment of its code with the requirements of the Gaia-X project.1 The EDC consortium includes multinational companies such as Microsoft, BMW and SAP. Following the developments of IDS and Gaia-X, there have been a number of publications that discuss use cases and challenges of dataspaces in different domains, e. g. in the context of spatial data infrastructures and INSPIRE [8] or in the context of a data ecosystem within smart cities/municipalities [9]. In the following survey we discuss the architecture, data model, identity management and usage control of the individual solutions. Architecture. Figure 1 shows the high-level architecture of an IDS ecosystem as described in the IDS Reference Architecture [3]. The central component is the connector, which allows offering data – referred to as meta information – and exchanging data with other participants. The connectors integrate into each participant’s infrastructure, i. e. the data source and data sink. Other components of such an ecosystem, which we do not discuss in detail in this paper, include the Clearing House, which serves as a logging service that records information relevant for clearing and billing as well as usage control, and the App Store, which provides apps to the connectors that perform various tasks in the IDS ecosystem (such as transforming, cleansing or analysing data). The tasks of identification, authentication, and authorization are undertaken by an Identity Provider component. According to the IDS architecture, there are central certificate authorities which are responsible for issuing and managing identity claims. We discuss the respective services in Section 3. The Metadata Broker represents a central component which registers and distributes metadata about which data offers are available from which participant and which usage conditions apply for using those data. Essentially, it fulfils the tasks of a data catalog across the dataspace by ensuring transparency about offers and corresponding usage policies. While the IDS architecture describes a central component, there are also approaches to build a federated catalog of data offers: Instead of directly loading/pushing the metadata into a central catalog, they are offered 1 https://github.com/eclipse-edc/Collateral/tree/main/Latest%20Presentations, last accessed 2023-06-19 to other connectors (i. e. to the individual federated catalogs of the members), which requires the dataspace members to regularly monitor each other for updates regarding the offers. An example of such a federated system is the catalog envisioned in the EDC project (cf. Section 3.2). Data Model. The IDSA published an IDS Information Model as an RDFS/OWL ontology [10] that defines the types of digital content exchanged in the IDS infrastructure. The model is mainly developed by Fraunhofer FIT and Fraunhofer IAIS and maintained on GitHub; the latest version is 4.1.0, published under Apache License 2.0.2 The connectors discussed in Section 3 all state that the respective data model is based on this information model. Identity Management. Identity and trust mechanisms form the basis for considerations of data protection as well as access and usage rights. These mechanisms are intended to enable unique identification in a federated environment. In the context of dataspaces, trust between the participating organizations and components is established through a public key infrastructure, either through a central certification authority (cf. the DAPS service of the IDSA) or through the use of decentralized identifiers (cf. the EDC project). Usage Control. The usage control layer manages the rules for using and sharing the data. These rules are defined either by the owner of the data, the provider, by the government or the previous owner [11]. Data usage control can only be enforced if the respective mechanisms are installed on the data consumer side [11] – in a dataspace ecosystem this is the task of the connectors. Many policy languages have been suggested for usage control. The Open Digital Rights Language (ODRL) [12], originally intended for expressing licenses, allows for simple rules and constraints expressed through logical operators. However, the ODRL and its derivatives lack guidance for specific conditions like time, location and quantity which are needed for detailed usage policies. The usage control approaches of most of the connectors discussed in this paper are based on the ODRL. 3. Dataspace Connector Survey A dataspace connector can be described as a trustworthy software component that supports the definition of usage control policies and the verifiable enforcement of those policies. In this short survey, we select current open-source projects that develop IDS-compliant dataspace connectors. We compare these initiatives’ technical details in order to provide insights into the current level of maturity and readiness. The selected projects are based on the connectors listed in the Data Connector Report by the [13]. We reduced the list to those that are available open-source in a public repository (e. g. on GitHub), cf. Table 1. Note that although some other connectors are also listed as open-source in the report, their repositories are not actually publicly available, so we did not include them in the survey; the report (published November 2022) lists 16 connectors, 9 of which as open-source, 2 https://w3id.org/idsa/core-410, last accessed 2023-06-19 Table 1. Open-source connectors that are currently available/developed. Name Main contributor Github project DSC sovity GmbH gh:International-Data-Spaces-Association/DataspaceConnector EDC EDC Consortiuma gh:eclipse-edc/Connector TRUE Engineeringb gh:Engineering-Research-and-Development/true-connector Trusted Fraunhofer AISEC gh:Fraunhofer-AISEC/trusted-connector a Consortium members include BMW, the Fraunhofer Society, Microsoft and SAP. b Engineering Ingegneria Informatica S.p.A., https://www.eng.it/ Table 2. Key characteristics of the open-source connectors (last accessed 2023-06-19). Name Created Stars Commits Language Usage control DSC 2020-10-07 20a 2600 Java IDS lang. (ODRL-based) EDC 2021-07-26 167 1653 Java ODRL-based TRUE 2020-10-30 18 82 Java Platoon/MyData app (IDS lang.) Trusted 2017-09-05 3 2083 Kotlin LUCON lang. a The base repository of the forked DSC currently lists 96 stars. but only 4 actually provide their source in a public repository: the IDS Dataspace Connector (DSC) by sovity, the Eclipse Dataspace Connector (EDC), the TRUsted Engineering (TRUE) Connector and the Trusted Connector by Fraunhofer AISEC. Looking at the code repositories of the connectors (cf. Table 2), the most popular connector in terms of GitHub stars is the EDC. The most actively developed connectors in terms of number of commits are the DSC and the Trusted Connector.3 3.1. IDS Dataspace Connector (DSC) The DSC was initially developed by Fraunhofer ISST but is now maintained by the company sovity. The connector uses the IDS Information Model and IDS Messaging Services for message handling and provides a REST API for managing datasets by means of their metadata as IDS resources. It supports TLS-encrypted communication with other IDS connectors, data usage control rules, and integration with an identity provider. Furthermore, the developers state that it is designed to provide companies with an easy and trustworthy entry into the IDS. At the time of writing (in February 2023), the DSC is the only IDS connector that supports the enforcement of usage condition classes. The deployment of the connector can be done in Docker or Kubernetes. Architecture. The architecture and functionalities of the IDS Connector are defined by the IDS Reference Architecture Model (RAM) [3]. The architecture of the connector potentially consists of several components, including the core connector at its centre (responsible for the 3 However, the last changes in the Trusted Connector repository date back to April 2022. identity management, usage control, communication, etc.), the data management component (which controls the data sources, endpoints and contracts) and optionally a GUI that offers a dashboard, catalog and policy templates.4 The external IDS Metadata Broker, which allows to (un)register and query data offers of the dataspace members, is reached by the connector via the defined messaging services. Data Model. The data model of the IDS Connector5 is based on the IDS Information Model [14]. The metadata of a dataset/data source is called a resource and includes e. g. the title, a description and license information. The resources of an IDS Connector are organized by catalogs. Additionally, a resource can hold a list of contract offers. Contract offers describe the potential consumer and provider of the data and can consist of multiple rules, so-called IDS Usage Control Patterns (see below), which control the access and usage. In case the provider and data consumer agree on the usage conditions, this is stated in a contract agreement. Figure 2 displays an example resource which is listed in a catalog. The example resource specifies a permission (as a rule in the attached contract offer). Identity Management. To establish “trust” between the participating IDS connectors, a public key infrastructure through a central certification authority is used. The individual identity certifi- cates of the participating components are managed by a central authority, the Dynamic Attribute Provisioning Service (DAPS). Connectors request a digitally signed JSON web token (JWT) from the DAPS in order to authenticate themselves. The DSC communicates with the DAPS provided by Fraunhofer AISEC by default. It is available at https://daps.aisec.fraunhofer.de/. The implementation of DAPS is open-source and can be accessed on GitHub.6 Usage Control. The DSC supports usage policies written in the IDS Usage Control Language, which is based on the ODRL [12]. It enables so-called “IDS Contracts”, which are divided into two main sections: contract-specific metadata and the IDS Usage Control Policy. The policy defines several Data Usage Control statements called IDS Rules that are specified in the IDS Usage Control Language and consist of permissions, prohibitions and obligations. The technically enforceable rules are then transformed to a technology-dependent policy for Usage Control enforcement. The DSC currently implements 9 out of the 21 policy classes defined by the IDSA Position Paper on Usage Control [15]. Figure 2 holds an example policy that permits use, i. e. gives access, for the stated validity period of the contract offer. 3.2. Eclipse Dataspace Connector (EDC) The EDC7 is a framework that implements the IDS standard as well as part of other services in the Eclipse Dataspace Components required to build a dataspace. The project has a documentation 4 An architecture diagram can be found in the online documentation of the IDS Connector: https://international-dat a-spaces-association.github.io/DataspaceConnector/Documentation/v6/Architecture, last accessed 2023-06-19 5 https://international-data-spaces-association.github.io/DataspaceConnector/Documentation/v5/DataModel, last accessed 2023-06-19 6 https://github.com/International-Data-Spaces-Association/IDS-G, last accessed 2023-06-19 7 https://github.com/eclipse-edc/Connector, last accessed 2023-06-19 @prefix ids: . @prefix xsd: . a ; ids:offeredResource . a ids:Resource ; ids:contractOffer ; ids:description "Resource of an IDS Connector" ; ids:title "Example Resource" . a ids:ContractOffer ; ids:contractEnd "2022-12-24"^^xsd:dateTimeStamp ; ids:contractStart "2022-12-25"^^xsd:dateTimeStamp ; ids:permission . a ids:Permission ; ids:action ; ids:description "provide-access" ; ids:title "Example Usage Policy" . Figure 2: Example of an IDS catalog, resource, contract offer and permission in RDF Turtle syntax. The example uses the IDS Information Model [14]. website;8 however, the majority of relevant information is instead found in Markdown files inside the different repositories. Architecture The EDC is designed to align with the standards and guidelines established by Gaia-X. It supports IDS-based messages and policy definitions, which are also used by Gaia-X, and participates in IDSA committees and working groups to pursue its alignment with both Gaia-X and the IDSA9 . The EDC consists of a Connector, a Federated Catalog Node, a Federated Catalog Crawler, a Policy Management, a Data Asset Management, an Identity Hub, and a Registration Service9 . The goal of the project is to work on a decentralized data space implementation: while, according to the documentation, the EDC shall support IDSA-based components like the DAPS service for identity management and the Metadata Broker, it aims to implement decentral- ized approaches such as identity management via Decentralized Identifiers [16] or Federated Catalogs. A Federated Catalog provides data contract offers while also collecting offers from other dataspace participants. The identity information of a participant is provided by their Identity Hub, while the Registration Service contains information about all participants of a dataspace. While earlier presentations9 mentioned Policy Management as well as Data Asset Management components, there is currently no detailed description provided at that time of writing.8 8 https://eclipse-edc.github.io/docs, last accessed 2023-06-19 9 https://github.com/eclipse-edc/Collateral/blob/main/Latest%20Presentations/2022-04-26%20Eclipse%20Dataspace %20Connector%20-%20Overview%20Deck.pdf, last accessed 2023-06-19 var readPermission = Permission.Builder.newInstance().action(Action.Builder .newInstance().type("READ").build()).build(); var distributeProhibition = Prohibition.Builder.newInstance().action(Action.Builder .newInstance().type("DISTRIBUTE").build()).build(); var readNotDistributePolicy = Policy.Builder .newInstance().id("use-all").permission(readPermission) .prohibition(distributeProhibition).target("test-document").build(); Figure 3: Example Java code of an EDC policy for allowing read access and disallowing further distribu- tion of an asset. Data Model. The EDC is based on IDS standards and uses terms from the IDS Information Model. In earlier versions and presentations9 it differed in some details, e. g. shared resources are called assets, which are symbolic links to datasets; contracts defined the data exchange between two parties, with different stages (starting with “contract definition”); contract offers are instantiations of a contract definition for a specific consumer. Identity Management. The identity management of the EDC is explained in an earlier presentation:9 an EDC dataspace can either have a central dataspace authority or a fully decentralized one. A connector needs a decentralized identifier (DID) [16] anchored in a trust framework, as well as a self-description that consists of attributes of the member, a list of verifiable credentials (VC) [17], a pointer to the identity hub, a pointer to claims and proofs, and URLs of required endpoints. In case of a central dataspace authority, a participant is verified by querying the central authority and verifying the membership as well as the claims using the DID and VC. In case of a fully decentralized approach, the VC need to be signed by other members and are replicated among them along with the member registry and the policies. Usage Control. The EDC aims to supports usage and access policies which are based on the ODRL policy model. In a recent sample code,10 the connector uses an ODRL-compliant policy (in JSON-LD syntax); however, at the time of writing, the sample policy is very simplistic (no specific constraints, allowing “direct access to all assets”). The idea of policies in the EDC is aligned with ODRL. Policies are sets of rules specifying allowed, disallowed or required actions of a consumer for requested assets: Permissions define allowed actions on the asset and can include conditions. Prohibitions disallow specific actions, while obligations require the consumer to perform certain actions.11 Figure 3 demonstrates the implementation of policies in the EDC program code. 3.3. TRUsted Engineering (TRUE) Connector The TRUE Connector is an open-source connector that enables trusted data exchange and allows participation in an IDS ecosystem, as well as governance models, to facilitate secure 10 https://github.com/eclipse-edc/Samples/blob/main/transfer/transfer-07-provider-push-http/README.md#3-cre ate-a-policy-on-the-provider, last accessed 2023-06-19 11 https://github.com/eclipse-edc/Connector/blob/main/docs/developer/architecture/usage-control/policies.md, last accessed 2023-06-19 and standardized data exchange and linkage. According to the connector’s documentation, it is compliant with the latest IDS specifications. Architecture. The architecture of the TRUE Connector consists of three components: The Execution Core Container (ECC) is responsible for the data exchange within the IDS ecosystem, representing data using the IDS Information Model, interacting with external Identity Providers and communicating with an IDS Broker for registration and querying information. The Back- End (BE) Data Application represents a somewhat trivial data application for generating and consuming data on top of the ECC component. The last component is the Usage-Control (UC) Data Application, which, however, does not include contract negotiation procedures. The first two are licensed under AGPLv3, while the UC App’s license is still to be determined. Data Model. The ECC data model is based on the IDS Information Model. Identity Management. Identity provider support is off by default, but can be turned on in the settings. The TRUE Connector supports identity verification using the IDS Dynamic Attribute Provisioning Service (DAPS). Usage Control. Usage control is optional and turned off by default, but turning it on is mandatory for contract negotiation. The TRUE Connector supports both, the Platoon Usage Control Data App and the MyData Usage Control Data App; the default is Platoon. The Platoon Usage Control module is a modification of the IDS Dataspace Connector (DSC) and supports usage policies written in the IDS Usage Control Language. It includes REST services for getting, uploading, and removing Contract Agreements. Additionally, it includes a REST service for applying usage control enforcement on input data according to the related Contract Agreements. Figure 4 displays a sample Contract Agreement in the IDS Usage Control Language. 3.4. Trusted Connector The IDS Trusted Connector is an open-source framework developed by Fraunhofer AISEC. It describes itself as an open IoT edge gateway platform and states that it implements the IDS Reference Architecture12 and that it offers a range of protocol adaptors to connect sensors with cloud services and other Connectors. Architecture The Trusted Connector consists of a Core Container and one or more Applica- tion Containers. The Core Container provides the main functionality and is the sole intermediate between the Application Containers and the internet. It is based on Spring Boot13 and provides a REST API. Services include Usage Control, Route Manager, and the IDS protocol. The Route Manager allows for message routing based on Apache Camel, and includes protocol adapters for secure communication between Trusted Connectors. Applications come in the form of Docker 12 https://industrial-data-space.github.io/trusted-connector-documentation/docs/overview/, last accessed 2023-06-19 13 https://spring.io/projects/spring-boot, last accessed 2023-06-19 {"@context": {"ids": "https://w3id.org/idsa/core/", "idsc": "https://w3id.org/idsa/code/"}, "@type": "ids:ContractAgreement", "@id": "https://ex.org/contract/restrict-access-interval", "ids:permission": [{ "ids:action": [{"@id": "idsc:USE"}], "ids:constraint": [{ "@type": "ids:Constraint", "ids:leftOperand": {"@id": "idsc:POLICY_EVALUATION_TIME"}, "ids:operator": {"@id": "idsc:TEMPORAL_EQUALS"}, "ids:rightOperand": { "@type": "ids:interval", "@value": { "ids:begin": {"@value": "2021-06-15T00:00:00Z", "@type": "xsd:datetimeStamp"}, "ids:end": {"@value": "2021-12-31T00:00:00Z", "@type": "xsd:datetimeStamp"} }}}]}]} Figure 4: Example of a Contract Agreement in the MyData Usage Control Data App, written in the IDS Usage Control Language. The contract restricts the use by a given time interval. flow_rule { id anonymized // Rule id description "Don't leak personal or internal" when publicEndpoint // Target identifier receives { label(personal) or label(internal) } // Received message labels decide drop } // Drop message Figure 5: Example of a LUCON policy to anonymize personal data before they are transmitted. containers, and are initially isolated from each other and restricted in a virtual network with the Core Container. This prevents malicious applications from interfering with the running system. Identity Management Trusted Connectors use the IDS Dynamic Attribute Provisioning Service (DAPS) to authorize each other in order to establish cross-enterprise authorization. Every connector possesses a unique identifier embedded in a X.509 device certificate which is used to authenticate the connector instance. A Dynamic Attribute Token (OAuth Access Token) is used to store attributes such as certification status or IDS membership. To perform this authorization, the requesting connector needs to present its device certificate to the DAPS in order to receive a Dynamic Attribute Token. This token is then used to access the connector’s resources. Usage Control The Trusted Connector provides a policy framework for “Logic Based Usage Control” to enable the usage control of data flows between Apps and Connector instances. LUCON, the policy language for controlling data flows, allows the labeling of data and the enforcement of specific actions to be carried out. Data can be limited from leaving a connec- tor, anonymized, or logged. For example, a policy may state that all personal data must be anonymized before it leaves the Connector, or that data must be deleted after 30 days. A LUCON policy consists of two parts: a flow rule and a service description. The flow rule defines the conditions under which the policy should be applied, and the service description defines the services to which the rule applies. Figure 5 displays an example flow rule to anonymize personal data before leaving the connector: the rule anonymized declares that if a service matching the publicEndpoint description receives a message that contains the label “personal” or “internal”, the message has to be dropped. 4. Conclusion The adoption and use of dataspaces in real-world use cases depends on the maturity of the available technologies. This means that dataspaces will only become successful if there are open-source connectors that are simple, well-documented and offer a high level of technological readiness. To assess this readiness, we have surveyed existing open-source implementations of IDS-compliant connectors with regard to their architecture, underlying data model and usage control language. In conclusion, our key findings can be summarized as follows: • The reviewed connectors all state that they implement the IDS architecture and that they are aligned in terms of central identity management. However, the EDC framework is also developing an alternative decentralized identity verification system. • We have found different approaches to set policies in the connector implementations. The implementations use ODRL and partly define their own usage control languages (e. g. the IDS Usage Control Language or the LUCON policy language by Fraunhofer AISEC). These differences pose risks of incompatibility when describing usage policies and could potentially complicate building an ecosystem across connectors. • Conducting the research for this survey was complicated partly based on the software projects’ documentations. We point out the surprisingly bad state of documentations and instructions of some of the projects, which pose a clear risk of limited up-take and dissemination of the tools. Given the state of documentations, we have noted a rather low level of technical readiness/maturity, which in its current state additionally hinders the adoption of connectors in industry. An important aspect that we will address in future work is a more structured benchmark- ing of the existing implementations by setting up defined tasks and experiments to assess interoperability between systems, maturity, as well as performance and scalability. References 1. DE-CIX Management, G. Eggers, B. Fondermann, Google Germany, B. Maier, K. Ottradovetz, J. Pfrommer, R. Reinhardt, H. Rollin, A. Schmieg, S. Steinbuß, P. Trinius, A. Weiss, C. Weiss, S. Wilfling, GAIA-X: Technical Architecture, 2020. URL: https://www.data-infrastructure. eu/GAIAX/Redaktion/EN/Publications/gaia-x-technical-architecture.pdf. 2. S. Bader, J. Pullmann, C. Mader, S. Tramp, C. Quix, A. W. Müller, H. Akyürek, M. Böck- mann, B. T. Imbusch, J. Lipp, S. Geisler, C. Lange, The International Data Spaces Information Model – An Ontology for Sovereign Exchange of Digital Content, in: 19th International Semantic Web Conference (ISWC 2020), Springer, 2020, pp. 176–192. doi:10.1007/978-3-030-62466-8_12. 3. B. Otto, S. Steinbuß, A. Teuscher, S. Lohmann, IDS Reference Architecture Model, 2019. URL: https://internationaldataspaces.org/wp-content/uploads/IDS-Reference-Architectur e-Model-3.0-2019.pdf. 4. B. Otto, M. Jarke, Designing a Multi-Sided Data Platform: Findings from the In- ternational Data Spaces Case, Electron. Markets 29 (2019) 561–580. doi:10.1007/ S12525-019-00362-X. 5. J. Zrenner, F. O. Möller, C. Jung, A. Eitel, B. Otto, Usage Control Architecture Options for Data Sovereignty in Business Ecosystems, J. Enterp. Inf. Manag. 32 (2019) 477–495. doi:10.1108/JEIM-03-2018-0058. 6. J. Pampus, B.-F. Jahnke, R. Quensel, Evolving Data Space Technologies: Lessons Learned from an IDS Connector Reference Implementation, in: 11th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2022/Lecture Notes in Computer Science, vol. 13704, Springer, Cham, 2022, pp. 366–381. doi:10.1007/978-3-031-19762-8_27. 7. B. Otto, M. ten Hompel, S. Wrobel, Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, Springer, Cham, 2022. doi:10.1007/978-3-030-93975-5. 8. A. Kotsev, M. Minghini, R. Tomas, V. Cetl, M. Lutz, From Spatial Data Infrastructures to Data Spaces – A Technological Perspective on the Evolution of European SDIs, ISPRS Int. J. Geo-Inf. 9 (2020). doi:10.3390/IJGI9030176. 9. S. Cuno, L. Bruns, N. Tcholtchev, P. Lämmel, I. Schieferdecker, Data Governance and Sovereignty in Urban Data Spaces Based on Standardized ICT Reference Architectures, Data 4 (2019). doi:10.3390/DATA4010016. 10. W3C OWL Working Group, OWL 2 Web Ontology Language, 2022. URL: https://www.w3. org/TR/owl2-overview/. 11. A. Pretschner, M. Hilty, D. A. Basin, Distributed Usage Control, Commun. ACM 49 (2006) 39–44. doi:10.1145/1151030.1151053. 12. R. Ianella, S. Villata, ODRL Information Model 2.2, 2018. URL: https://www.w3.org/TR/odr l-model/. 13. International Data Spaces Association, Data Connector Report Version 1.0, 2022. URL: https://internationaldataspaces.org/wp-content/uploads/dlm_uploads/IDSA-Data-C onnector-Report-November-2022.pdf. 14. C. Lange, J. Langkau, S. Bader, The IDS Information Model: A Semantic Vocabulary for Sovereign Data Exchange, in: Designing Data Spaces: The Ecosystem Approach to Compet- itive Advantage, Springer, Cham, 2022, pp. 111–127. doi:10.1007/978-3-030-93975-5_ 7. 15. A. Eitel, C. Jung, R. Brandstädter, A. Hosseinzadeh, S. Bader, C. Kühnle, P. Birnstill, G. Brost, M. Gall, F. Bruckner, N. Weißenberg, B. Korth, Usage Control in the International Data Spaces, 2021. URL: https://internationaldataspaces.org/wp-content/uploads/dlm_uploads/I DSA-Position-Paper-Usage-Control-in-the-IDS-V3..pdf. 16. M. Sporny, D. Longley, M. Sabadello, D. Reed, O. Steele, C. Allen, Decentralized Identifiers (DIDs) v1.0, 2022. URL: https://www.w3.org/TR/did-core/. 17. M. Sporny, D. Longley, D. Chadwick, Verifiable Credentials Data Model v1.1, 2022. URL: https://www.w3.org/TR/vc-data-model/.