<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Data-Sovereign Enterprise Collaboration using the Solid Protocol</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Thorsten</forename><surname>Kastner</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">DATEV eG</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Friedrich-Alexander University (FAU)</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">J</forename><surname>Braun</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Karlsruhe Institute of Technology (KIT)</orgName>
								<address>
									<settlement>Karlsruhe</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andreas</forename><surname>Both</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">DATEV eG</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff4">
								<orgName type="institution">Leipzig University of Applied Sciences</orgName>
								<address>
									<settlement>Leipzig</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dustin</forename><surname>Yeboah</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">DATEV eG</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sebastian</forename><forename type="middle">J</forename><surname>Schmid</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Friedrich-Alexander University (FAU)</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Daniel</forename><surname>Schraudner</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Friedrich-Alexander University (FAU)</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tobias</forename><surname>Käfer</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Karlsruhe Institute of Technology (KIT)</orgName>
								<address>
									<settlement>Karlsruhe</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andreas</forename><surname>Harth</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Friedrich-Alexander University (FAU)</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="department">Division Data Spaces and IoT Solutions</orgName>
								<orgName type="institution">Fraunhofer Institute for Integrated Circuits IIS</orgName>
								<address>
									<settlement>Nuremberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Data-Sovereign Enterprise Collaboration using the Solid Protocol</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">5960CA7AF13F0195291A8DD4CBA9AC51</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Solid Protocol</term>
					<term>Dataspaces</term>
					<term>Data Value Chains</term>
					<term>Zero Trust</term>
					<term>Data Sovereignty</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We demonstrate a system architecture for seamless and sovereign business-to-business (B2B) data sharing using the Solid Protocol. We highlight two core system components: The Rights Delegation Proxy allows organizations to internally manage and enforce access policies on requests from their employees to external data providers. The Data Provision Proxy allows organizations to share data from an external data provider in a privacy-preserving manner. Organizations define and enforce the policies for internal and external data sharing themselves, thereby maintaining sovereignty in enterprise collaboration.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In today's connected world, data sharing between enterprises and among organizations is commonplace. Both providing and consuming businesses benefit from sharing data in collaboration. In their data-sharing processes, today's businesses often rely on centralized platforms or ad-hoc solutions like email attachments. As the requirements of data sovereignty, security, and separation of data and application <ref type="bibr" target="#b0">[1]</ref> become more pressing, endeavors like the International Dataspaces (IDS) 1 or Solid Dataspaces (SDS) <ref type="bibr" target="#b1">[2]</ref> are gaining momentum.</p><p>Building on the SDS approach, we present a system for sovereign data sharing along a chain of enterprises. We implement a use case for credit requests, where an enterprise requests a credit from a bank and is required to provide data made available by the enterprise's tax advisor. Only the directly communicating actors know each other, so the origin of data passed on must remain hidden while data is still processed along the business chain. In our solution, the data is not stored as a hard copy for each participant. Instead, data from the original source is passed along to involved parties on-demand if access is granted. The party owning the data source is in control of data access and -we assume here -has permitted re-distribution according to contractually defined purposes. We thus present an implementation of a data value chain <ref type="bibr" target="#b2">[3]</ref>. In this paper, we highlight the core components of our demonstrator: a Rights Delegation Proxy (RDP) <ref type="bibr" target="#b3">[4]</ref> to handle the actions of natural persons on behalf of legal entities, and a Data Provision Proxy (DPP) <ref type="bibr" target="#b2">[3]</ref> to requests to concealed locations along the chain. Our contribution is the demonstration of a Solid-based system for sovereign B2B data sharing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Use Case</head><p>Fig. <ref type="figure" target="#fig_0">1</ref> illustrates our use case where the banking institution BigBank, the tax advisory office TAO, and the company SME create a data value chain for a credit offer scenario. As a representative of BigBank, the bank employee Lisa acts as a natural person.</p><p>Upon a credit request, BigBank is to create a credit offer for the requesting organization SME. The bank's employee Lisa is responsible for this task. To assess the financial situation of SME, Lisa needs to access accounting data and a business report of SME. This data is prepared and provided to SME by TAO. To get the credit, SME must provide that data to BigBank. In this data value chain, two requirements exist regarding business relationships and data sovereignty <ref type="bibr" target="#b2">[3]</ref>:</p><p>A: The relation between SME and TAO must remain secret until SME is to disclose it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B:</head><p>The TAO is required to keep control over the aggregated business report data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Related Work</head><p>The Solid Protocol is a bundle of specifications for read/write Linked Data under access control.</p><p>The protocol builds on the RESTful HTTP specification of a Linked Data Platform (LDP) <ref type="foot" target="#foot_0">2</ref> for interacting with Web resources, and extends it with authentication and authorization using an extended version of OpenID Connect<ref type="foot" target="#foot_1">3</ref> and Web Access Control <ref type="foot" target="#foot_2">4</ref> .</p><p>For handling the delegation of rights by real-world businesses, government-managed registers of commerce are used. Companies publicly and lawfully declare which individuals may act and negotiate on their behalf; see the German Commercial Register<ref type="foot" target="#foot_3">5</ref> for example. In cyberspace, the long-standing vision of dataspaces aims to integrate different data sources <ref type="bibr" target="#b0">[1]</ref>: Top-down approaches like the International Data Space (IDS) <ref type="foot" target="#foot_4">6</ref> or GAIA-X<ref type="foot" target="#foot_5">7</ref> aim for sovereign data exchange using governance models and standardized data exchange components. From a bottom-up perspective, Meckler et al. <ref type="bibr" target="#b1">[2]</ref> identifies the Solid Protocol<ref type="foot" target="#foot_6">8</ref> as one technological foundation for decentralized yet interoperable dataspaces, named Solid Dataspaces <ref type="bibr">(SDS)</ref>.</p><p>For data exchange between collaborating enterprises, Henselmann et al. <ref type="bibr" target="#b4">[5]</ref> present a Solidbased solution in a credit request scenario similar to ours. While their solution passes data along a chain of participants, their system relies on hard copies of data to be stored at each participant and does not include natural persons as actors for legal entities. In a machine-to-machine interaction use case, Wang et al. <ref type="bibr" target="#b5">[6]</ref> present rule-based agents that negotiate a trade contract under German law using the Solid Protocol. In contrast to our approach, decision-making is automated and all participants, their needs, and data are known.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Demonstrator</head><p>Our demonstrator 910 is composed of the following components for each company (see Fig. <ref type="figure">2</ref>):</p><p>Solid Business Web Apps enable the employees to carry out their business activities. For the example of SME, the initiation of a credit inquiry, the provision of the business reports requested by the bank to prepare a credit offer, and the approval of the Bank's credit offer. In addition, an authorization application, as described in <ref type="bibr" target="#b6">[7]</ref>, is used to manage incoming, existing, rejected, and revoked requests for data sharing. A Company's Solid Pod stores the company's business data and makes it available under access control. Notably, it also contains rights delegation policies, i.e., rules that define which specific employees are allowed to interact internally and externally on behalf of the company. Further, it contains definitions for resources that are made available via proxied data provision. A Rights Delegation Proxy (RDP), as described in <ref type="bibr" target="#b3">[4]</ref>, receives and logs requests made by the company's employee (e.g., Tom). It authenticates the employee using their WebId and checks if they were delegated the required rights to proceed with their request. To this end, the RDP retrieves and validates corresponding policies defined by the delegator (SME) from their Pod. If all requirements are fulfilled, the RDP proceeds with the delegatee's request but updates the authentication headers with the delegator's credentials. Any received response is logged and forwarded to the delegatee. A Data Provision Proxy (DPP), as envisioned in <ref type="bibr" target="#b2">[3]</ref>, receives all data requests (e.g., from Lisa on behalf of BigBank) and checks on the Pod whether the requested resource is an actual Pod-stored resource or to be retrieved and passed along from an external data source. That is, it validates if the company's own data (SME) or data from a third party (TAO shared with SME) is requested. If the requested data originate from a third party, the DPP checks the sharing policy of the third party. If allowed, the DPP retrieves the resource (authenticated as SME) and provides it as if originating from the company (SME), masking the original data source (TAO).</p><p>A walk-through of our demonstrator:</p><p>1. Lisa logs in to the business Web App using her own WebID. To retrieve the accounting data on the SME's Pod, she sends an authenticated request to the RDP of BigBank. 2. The BigBank RDP authenticates Lisa and checks if she is authorized by the bank's policies to interact with SME. Then it requests the resource from SME, authenticated as BigBank. 3. The SME DPP receives the authenticated request coming from BigBank to access the accounting data. It checks whether the requested resource is an actual Pod-stored resource or an external one to be forwarded. Additionally, it checks if re-distribution is allowed. 4. On pass, the SME DPP performs an authenticated request as SME for the TAO's data. 5. The TAO DPP receives an authenticated request from SME to the resource containing the accounting data. As this resource is an actual Pod-stored resource, the request is forwarded. The Pod checks access control rules and returns the data via the proxy. 6. The SME DPP receives the response, logs it, and responds to the request of BigBank. 7. The BigBank RDP receives the response from SME and forwards it to Lisa's app. A screencast of our demonstrator is available online<ref type="foot" target="#foot_9">11</ref> .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fulfillment of requirements:</head><p>Our system demonstrates how the requirements defined in Sec. 2 can be met:</p><p>A: BigBank and TAO are not disclosed to each other while Lisa (i.e., BigBank) still receives the desired data. SME and its RDP are acting as a broker facilitating the data sharing. B: The accounting data remains stored on TAO's Pod and in its control, without hard copies being necessary at the SME's Pod. Additionally, we highlight the following features of our approach:</p><p>• The data value chain could also continue further by the TAO without the SME knowing the additional upstream participants. • The existence of participants is secret and only revealed on a "need to know"-basis.</p><p>The existence of upstream or downstream business participants is obfuscated. Acting employees also remain private as their actions are attributed to the respective company.</p><p>• Policies for data access and re-use specify relations between two agents, e.g., the internal relation of Lisa and BigBank or the external relation of SME and TAO. The policies and thus the existence of these bilateral relations remain only known to the involved agents.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions and Future Work</head><p>In this paper, we presented a Solid-based system for sovereign data sharing between enterprises. Our main contribution is the demonstration of a data value chain that respects the privacy and data sovereignty of its participants. We emphasize that our demonstrator is comprised of reusable components based on Web standards and the Solid Protocol to build a Solid Dataspace. We highlighted the Rights Delegation Proxy (RDP), to let natural persons acting on behalf of their companies, and the Data Provision Proxy (DPP), to retrieve data from upstream data sources. We re-iterate that both of these components are built using the same Semantic Web standards and specifications as the rest our demonstrator.</p><p>In future work, we plan to address the process of interactively initiating a B2B collaboration while also protecting the currently often publicly accessible metadata of the involved enterprises.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Use Case: a credit request.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>4 Figure 2 :</head><label>42</label><figDesc>Figure 2: Component view of the system deployed at each organization. Components not relevant to the walkthrough described are greyed out in the figure.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">https://www.w3.org/TR/ldp/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_1">https://solidproject.org/TR/oidc</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_2">https://solid.github.io/web-access-control-spec/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_3">https://www.handelsregister.de/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_4">https://github.com/International-Data-Spaces-Association/IDS-RAM_4_0</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_5">https://docs.gaia-x.eu/technical-committee/architecture-document/22.04/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_6">https://solidproject.org/TR/protocol</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_7">https://github.com/mandat-project/hackathon-demo</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_8">https://github.com/mandat-project/delegation-proxy</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="11" xml:id="foot_9">https://purl.archive.org/mandatb2b/Semantics2024</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments This work has been supported in part by the German ministry BMBF under grant 16DTM107B (MANDAT ).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">From databases to dataspaces: a new abstraction for information management</title>
		<author>
			<persName><forename type="first">M</forename><surname>Franklin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Halevy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIGMOD Rec</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="27" to="33" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The Web and Linked Data as a Solid Foundation for Dataspaces</title>
		<author>
			<persName><forename type="first">S</forename><surname>Meckler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dorsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Henselmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Companion Proceedings of the ACM Web Conference 2023</title>
				<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1440" to="1446" />
		</imprint>
	</monogr>
	<note>WWW &apos;23 Companion</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Towards Solid-based B2B Data Value Chains</title>
		<author>
			<persName><forename type="first">A</forename><surname>Both</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yeboah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kastner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schraudner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schmid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Käfer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">21st Extended Semantic Web Conference</title>
				<meeting><address><addrLine>ESWC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Rights Delegation Proxy: An Approach for Delegations in the Solid Dataspace</title>
		<author>
			<persName><forename type="first">S</forename><surname>Schmid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schraudner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
		<ptr target="https://ceur-ws.org/Vol-3705/paper02.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Workshop on Semantics in Dataspaces (SDS 2024) co-located with the 21st Extended Semantic Web Conference</title>
				<meeting>the Second International Workshop on Semantics in Dataspaces (SDS 2024) co-located with the 21st Extended Semantic Web Conference<address><addrLine>ESWC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Solid Proof of Concept in an Enterprise Loan Request Use Case</title>
		<author>
			<persName><forename type="first">D</forename><surname>Henselmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kolinsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Schmid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schraudner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Both</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Poster and Demo Track and Workshop Track of the 18th International Conference on Semantic Systems (SEMANTiCS 2022)</title>
				<meeting>Poster and Demo Track and Workshop Track of the 18th International Conference on Semantic Systems (SEMANTiCS 2022)</meeting>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3235</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Using schema.org and solid for linked data-based machine-to-machine sales contract conclusion</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename></persName>
		</author>
		<author>
			<persName><forename type="first">.-J</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Both</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Käfer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Companion Proceedings of the Web Conference 2022</title>
				<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="269" to="272" />
		</imprint>
	</monogr>
	<note>WWW &apos;22</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">AuthApp -Portable, Reusable Solid App for GDPR-compliant Access Granting</title>
		<author>
			<persName><forename type="first">A</forename><surname>Both</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kastner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yeboah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schraudner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schmid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Käfer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Web Engineering (ICWE</title>
				<imprint>
			<date type="published" when="2024">2024. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
