<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Need for Usage Control in Decentralized and Federated Ecosystems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Wout</forename><surname>Slabbinck</surname></persName>
							<email>wout.slabbinck@ugent.be</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">IDLab</orgName>
								<orgName type="department" key="dep2">Departement of Electronics and Information Systems</orgName>
								<orgName type="institution">Ghent University -imec</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Need for Usage Control in Decentralized and Federated Ecosystems</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F90EBA80DDF684D8DE0A88128F30C1B5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Decentralization</term>
					<term>Federation</term>
					<term>Usage Control</term>
					<term>Personal Data Stores</term>
					<term>Dataspaces</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In recent years, Personal Data Stores and dataspaces have emerged with the aim to provide data control and data sovereignty for their users. A method often adopted is to allow users to declare their own access control policies, containing rules for controlling who can perform which action upon what resource. Unfortunately, this does not take into account the full usage of the data, i.e. what happens after given action is performed. Another method, adopted by few, is to allow users to declare usage control policies (UCPs) which, when enforced correctly, allow to govern the full usage lifecycle of data. However, solutions supporting UCPs lack formalisation, thus reliance on specific implementations is required. We aim to provide said formalism to an interoperable usage control policy standard through a practical implementation of the UCP evaluator. Furthermore, we aim to integrate this evaluator into a usage control framework with the objective of working with any kind of resource server. Ultimately, the hope is that this research provides a foundation for future research on UCP enforcement alignment with legislation and improving user understanding of UCP implications.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In the mid-2000s, Web 2.0 emerged, which shifted the focus of the Web to centralized platforms <ref type="bibr" target="#b0">[1]</ref>. Compared to the original World Wide Web, which was more consumer-oriented due to the technical expertise required and inherently decentralized by design, it then became easier for general end-users to write on the Web. The centralized model came at the cost of delegating the responsibility of storing, sharing and governance of this data to these new platforms. This shift necessitated users placing trust in upholding these responsibilities by these platforms. However, recent years have shown that this trust was misplaced as there have been multiple cases of data breaches and data misuse in centralized platforms <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b5">3]</ref>. To combat challenges created by centralization, federated and decentralized systems have emerged that empower data sovereignty and control over data <ref type="bibr" target="#b6">[4,</ref><ref type="bibr" target="#b7">5,</ref><ref type="bibr" target="#b8">6]</ref>. The latter entails that the producer of data has control over how the data is used and who has access while adhering to the law 1 . In the decentralized spectrum, a plethora of Personal Data Store (PDS) technologies have been created such that end-users achieve control over their data <ref type="bibr" target="#b9">[7]</ref>. On the federated side, the idea of dataspaces as a solution that aims to gain data sovereignty.</p><p>The common ground of these initiatives allows us to extract several requirements that are important to reach the aim of data control and sovereignty. (i) First, there is a need for enforcing mechanisms pertaining to the use of the data, rather than the access <ref type="bibr" target="#b10">[8,</ref><ref type="bibr">9]</ref>. With existing systems users can give access to a certain resource, but they should be able to say that is only for the purpose of verification, only possible for one week and that the data should be removed from their local machine after one week. (ii) A language is required to capture all those constraints in one policy. However, since it is under the control of the user, it means that they must be able to express it. It cannot be expected that everybody is technically gifted, so there is a need for inclusive mechanisms to express usage control policies <ref type="bibr">[10]</ref>. (iii) To achieve full data sovereignty, it is not enough that end-users govern the usage of data. They might declare policies that are actually illegal. There is thus a need to verify that the expressed policies conform to the laws of the country <ref type="bibr">[11,</ref><ref type="bibr" target="#b14">12]</ref>. (iv) Finally, we are designing this to be used in a decentralized or federated environment. As a result, every node in the environment must be able to interpret and enforce policies the same. Achieving this requires formalism and interoperability regarding both the policy language and the evaluation of the policy in monitoring scenarios and during access requests <ref type="bibr" target="#b15">[13,</ref><ref type="bibr" target="#b16">14]</ref>. (v) While all the previously mentioned arguments show the necessity to fundamentally achieve full control over data and data sovereignty, they lack expressing the scalability of such an ideal system. It does not allow to answer questions about how fast should a revocation of consent be handled. In other words how long can end-users be sure that they are still conforming to the policies?</p><p>These requirements, correspondingly summarized as usage control over access control enforcement, understandable policies, legal alignment, formalisation and interoperability, and scalability, are the necessary (but not automatically sufficient) conditions identified through the research on data sovereignty and control in decentralized and federated systems. In Section 2, this research on the state-of-the-art is further elaborated. In my Ph.D. I will focus on tackling challenges (i), (iv), and (v) and follow up on the developments of (ii) and (iii) so that they can be integrated with my work. To further narrow down what I will contribute to these challenges, I have formulated two research questions in Section 3. The practical execution plan to provide answers is detailed in Sections 4 and 5. My progress and insights thus far are summarized in Section 6. Finally, I conclude by giving an overview and future prospects regarding data sovereignty and control through decentralized or federated usage control.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Achieving data sovereignty and data control requires usage control, which extends traditional access control by incorporating deontic concepts <ref type="bibr" target="#b10">[8]</ref>. Next to permissions and prohibitions, deontic concepts include obligations, a party must do something before or after a certain event, and dispensations, a party is excluded from an obligation. As a consequence, it is not only important to verify compliance at an access request, but also during the whole lifecycle of data use. Indicating the need for mechanisms to facilitate the continuous monitoring and auditing of data use <ref type="bibr">[9]</ref>. In their survey on usage control, Akaichi and Kirrane <ref type="bibr" target="#b17">[15]</ref> concluded the importance of semantic technologies for encoding usage control policies regarding interoperability. Furthermore, they highlight the need for research on verification and testing tools and the importance of benchmarks with regard to usage control solutions. There exist multiple semantic usage control languages, though, to the best of my knowledge, there is only one which is also a W3C Recommendation, more specifically the Open Digital Rights Language (ODRL) <ref type="bibr" target="#b18">[16]</ref>. In an ODRL policy, permission, prohibitions and obligations can be defined as rules. In each rule, the involved parties, possible actions and target resources can be encoded. Constraints facilitate further refinements such as intended purpose, cardinality and temporal limitations. A point of critique stated by multiple researchers is the lack of formalism to this date <ref type="bibr" target="#b15">[13,</ref><ref type="bibr" target="#b16">14,</ref><ref type="bibr" target="#b17">15,</ref><ref type="bibr" target="#b19">17,</ref><ref type="bibr" target="#b20">18,</ref><ref type="bibr" target="#b21">19,</ref><ref type="bibr" target="#b22">20]</ref>. However, a W3C Community Group (CG) is formed to create formal semantics for ODRL and create an ODRL evaluator for an access control and policy monitoring scenario<ref type="foot" target="#foot_0">2</ref> .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Usage Control in Decentralized Systems</head><p>Personal Data Stores (PDSs), a decentralized solution, allow users to store, manage and control their data <ref type="bibr" target="#b9">[7,</ref><ref type="bibr" target="#b23">21]</ref>. In the Semantic Web, the most widely adopted technology is the Solid Protocol<ref type="foot" target="#foot_1">3</ref>  <ref type="bibr" target="#b24">[22]</ref>. Solid is built on existing W3C Recommendations and has as its goal, next to control over data, to promote data reuse which is achieved through the decoupling of data and applications. Data is stored in resources on a pod. On this level of granularity, access control rules can be configured using either the Web Access Control (WAC) or the Access Control Protocol (ACP). These specifications only allow to specify access control and not usage control. Thus there is a need in Solid to define proper usage control policies such that the data sovereignty goal can be achieved. Different papers expressed this need, though to this day, no consensus in the Solid CG has been reached on how to fulfill this need <ref type="bibr" target="#b21">[19,</ref><ref type="bibr" target="#b25">23,</ref><ref type="bibr" target="#b26">24,</ref><ref type="bibr" target="#b27">25,</ref><ref type="bibr" target="#b28">26]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Usage Control in Federated Systems</head><p>In recent years, dataspace initiatives have gained significant attention. One of the core principles of these federated systems is data sovereignty <ref type="bibr" target="#b6">[4]</ref>. The International Data Space Association (IDSA) and Gaia-X are the two leading initiatives which have been proposing architectural solutions to standardize and build dataspaces. A recurring concept is the dataspaces connector as an entry point within dataspaces. They facilitate data exchange which is safeguarded by data usage contracts, ensuring data sovereignty. This agreement defines the usage of the data and is the result of negotiation between data consumers and providers prior to the exchange. To the best of our knowledge, they are either expressed or have been heavily influenced by ODRL policies 456 <ref type="bibr" target="#b29">[27,</ref><ref type="bibr" target="#b30">28,</ref><ref type="bibr" target="#b31">29]</ref>. Current dataspace connectors have been implementing their interpretation of ODRL 78 due to the lack of formalisation of how to evaluate ODRL.</p><p>Recently, technical attempts were undertaken to combine both PDS and dataspace technologies <ref type="bibr" target="#b33">[30,</ref><ref type="bibr" target="#b34">31]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Problem statement and Research Questions</head><p>Achieving data sovereignty and control includes the enforcement of the use of the data and the necessity of decentralized or federated systems that can interoperate as one network. As such, the objective of my research is centred around enforceable and interoperable usage control systems. The following research questions aim to contribute to the usage control domain for decentralized and federated systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>RQ-I Accountability</head><p>This entails transparency by proving that the data use was correct, is currently correct and will be correct in the future. The first aspect of correctness is the fact that the usage of data can be expressed as a policy in a formal and interoperable language. Interoperability in the sense that every actor within a network must interpret the policies in the same manner and formality in the sense that the rules and constraints of those policies prove that certain action was allowed at a given time. Furthermore, tracking data usage over time allows for the verification and auditing of past actions, and the dynamicity of future actions can be reasoned upon. How would such a proof look like? What are the necessary and sufficient conditions for conformance to a policy which entails both the request, the policy itself but also the state of the world? RQ-II Scalability Optimisation of the theoretical foundation that allows estimating the needs on computation and storage, and the limits of how long policies can be trusted. To the best of my knowledge, there are no benchmarks on usage control policy evaluations. Therefore it is hard to estimate what the requirements and behaviour are for usage control enforcement systems. Performance metrics for usage control systems are vital for ensuring real-time data usage guarantees. This would allow us to determine bounds for the duration of a policy revocation or confirmation, which in turn ensures that every actor uses data under the constraints of the policies at any given time based on their available knowledge. What are the key performance metrics for a benchmark that evaluates a real-time usage control policy enforcement system?</p><p>How can we devise scalable simulations for usage control enforcement scenarios that accurately reflect real-world scenarios? How do these simulations compare with usage control on the Web itself, that is do the results reliably translate to Web-scale environments?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Methodology</head><p>The starting point for describing my methodology depends on revisiting the state-of-the-art as they both research questions rely on an interoperable usage control policy model. To this end, a decision has been made to continue with ODRL as a policy model. Answering RQ-I partially aligns with the work completed over the years by the ODRL Formal Semantics CG: the initiative of building an ODRL Evaluator. The idea is that based on a set of policies, performed and requested actions it provides proofs regarding whether usage of data was and is permitted and whether all obligations have been met. My approach to contribute consists of the creation of a test suite for validating the correctness of an ODRL Evaluator. Each test case is a tuple consisting of the input and the expected output of such evaluator. To this day, there exists no formal representation for certain input elements and the output. This indicates that the first task for creating a test suite is to establish models for the performed and requested actions, core attributes relating to constraints such as cardinality, and the conformance report.</p><p>To tackle the benchmark aspect for RQ-II, further analysis of usage control systems in the decentralized and federated systems is required. The evaluator could then either be included in an existing modular continuous usage control enforcement system or, based on the knowledge gained, such a system must be designed and created to integrate the evaluator. Finally, a multitude of use cases where usage control enforcement is required such that the system as a whole can be tested.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Evaluation</head><p>In the previous section, the method for answering RQ-I consists of creating multiple test cases with as output a conformance report. As ODRL contains three classes for rules representing the deontic concepts of permission, prohibition and obligation, a sub-task is to make a bottom-up test-suite for an ODRL permission evaluation. It allows us to define the necessary and sufficient conditions for this single deontic concept. Using this knowledge, a revision of the ODRL Evaluator can be created to support prohibitions. Any limitations to the conformance report can be picked up to adapt the model. Finally, a last iteration will be executed for obligations. This iterative approach, where the intermediate version of the conformance report is continuously refined, ensures that all aspects of the proof are included. This allows us to provide an answer to RQ-I and additionally results in an implementation for an ODRL Evaluator and accompanying a reference test suite that can be reused for the implementation of other evaluators.</p><p>To evaluate a usage control system in a network, it must not only be possible to measure all the different components in that system, but the communication must also be evaluated. For this, the plan is to have different scenarios. First, a baseline must be created against which each other different scenario will be evaluated. Then for each next scenario, variety will be introduced in one domain. At this time, the following scenarios are envisioned where a range is introduced to vary the number of nodes in the network, the number of constraints per policy, the number of policies per node, and the number of revocations. After measuring everything, it should be possible to answer which of those metrics are important and thus be able to answer RQ-II. However, if the data is not conclusive, new scenarios need to be investigated.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Preliminary Results</head><p>The results of my current research span both decentralized and federated systems. Initially, my focus was on Solid and its interoperability. It began with research on usage control agnostic approaches for storing real-time data over Solid pods <ref type="bibr" target="#b35">[32]</ref>. This was under the assumption that services could inherently have the appropriate access rights, recognize that they possess these rights, and encode the purpose of data use. The next phase evolved creating an ecosystem over these pods using Web agents <ref type="bibr" target="#b36">[33]</ref>, operating under the same assumptions regarding access rights and data use. However, this assumption proved incorrect, revealing amongst others the limitations of Solid current access control protocols and the tight coupling to its interface <ref type="bibr" target="#b37">[34]</ref>.</p><p>To introduce usage control enforcement in Solid, I initially attempted to do so externally using personal agents <ref type="bibr" target="#b27">[25]</ref>. However, I discovered that not all types of usage control policies, such as the purpose of data use, can be enforced as a service over the Solid protocol. Given that full usage control via external services is unfeasible, I have shifted my focus to exploring its feasibility within a Solid server while still adhering to the Solid specification. By implementing the Request Flow from the Solid Open ID Connect primer 9 , we can separate a Solid server into an Authorization Server 10 following the User-Managed Access (UMA) specification 11 and a Resource server <ref type="bibr" target="#b38">[35]</ref>. This approach seems promising but requires more research.</p><p>My research on usage control for federated systems began with a project centered around sharing sensitive data among multiple actors within a dataspace. This led to the design of a Usage Control Framework <ref type="bibr" target="#b22">[20]</ref>, which each actor can incorporate to continuously enforce usage control policies. While this approach envisions continuous enforcement, it currently lacks implementation, preventing evaluation of performance and scalability.</p><p>Continuation of these research efforts relies on the proof of data use at any point in time, emphasizing the necessity for an ODRL Evaluator and addressing RQ-I. Since the Usage Control Framework provides a blueprint for the creation of a system that can be benchmarked it might provide answers for RQ-II. Once the framework is in place, I plan to integrate it into the UMA server. Since the UMA specification is agnostic of the Resource Server it integrates with, this should enable continuous usage control enforcement for both Solid (through integration with the Community Solid Server <ref type="bibr" target="#b39">[36]</ref>) and dataspaces (by integration into an IDS connector).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>I have elaborated the research plan for my Ph.D. where I aim to contribute to the formalisation of ODRL evaluations and building the modular continuous usage control enforcement system.</p><p>Future work entails legal and usability to be combined with the UMA server making it possible to manage policies, and change policies that are compliant to the legislation of the country. This will make it possible to have true data sovereignty and control facilitated in both decentralized and federated systems.</p></div>			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">ODRL Formal Semantics W3C CG: https://w3c.github.io/odrl/formal-semantics/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_1">The Solid protocol: https://solidproject.org/TR/protocol</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_2">IDS Usage Control Policies (v6): https://international-data-spaces-association.github.io/DataspaceConnector/Documentation/ v6/UsageControl</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_3">IDS USage Control Contracts https://github.com/International-Data-Spaces-Association/IDS-G/tree/main/UsageControl/ Contract</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_4">Gaia-X and contracts: https://gaia-x.eu/news-press/gaia-x-and-contracts/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_5">Prometheus-X Data Space Connector (Gaia-X): https://github.com/Prometheus-X-association/dataspace-connector</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_6">MYDATA technologies (enforcing ODRL policies, used by IDSA): https://www.mydata-control.de/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Supported by SolidLab Vlaanderen (Flemish Government, EWI and RRF project VV023/10). I thank my supervisers Pieter Colpaert and Ruben Verborgh. Furthermore, I thank Beatriz Estevez, Julian Rojas, Ruben Dedecker and Jos De Roo for the discussions.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">O</forename><surname>Reilly</surname></persName>
		</author>
		<title level="m">What is web 2.0</title>
				<imprint>
			<publisher>O&apos;Reilly Media, Inc</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Malice domestic: The Cambridge analytica dystopia</title>
		<author>
			<persName><forename type="first">H</forename><surname>Berghel</surname></persName>
		</author>
		<ptr target="http://www.berghel.net/col-edit/out-of-band/may-18/oob_5-18.pdf" />
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="84" to="89" />
			<date type="published" when="2018">2018</date>
		</imprint>
		<respStmt>
			<orgName>IEEE Computer Society</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://solidproject.org/TR/oidc-primer#request-flow" />
		<title level="m">Solid-OIDC primer</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="https://github.com/SolidLabResearch/user-managed-access/" />
		<title level="m">UMA server integrated with a Solid server</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html" />
		<title level="m">User-Managed Access specification</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Zuboff</surname></persName>
		</author>
		<title level="m">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Semantics in Dataspaces: Origin and Future Directions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Theissen-Lipp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kocher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lange</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Decker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Paulus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pomp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Curry</surname></persName>
		</author>
		<idno type="DOI">10.1145/3543873.3587689</idno>
		<idno>doi:10.1145/3543873.3587689</idno>
		<ptr target="https://dl.acm.org/doi/10.1145/3543873.3587689" />
	</analytic>
	<monogr>
		<title level="m">Companion Proceedings of the ACM Web Conference 2023</title>
				<meeting><address><addrLine>Austin TX USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1504" to="1507" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Privacy-preserving AI Services Through Data Decentralization</title>
		<author>
			<persName><forename type="first">C</forename><surname>Meurisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Bayrak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mühlhäuser</surname></persName>
		</author>
		<idno type="DOI">10.1145/3366423.3380106</idno>
		<idno>doi:10.1145/3366423.3380106</idno>
		<ptr target="https://dl.acm.org/doi/10.1145/3366423.3380106" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of The Web Conference 2020</title>
				<meeting>The Web Conference 2020<address><addrLine>Taipei Taiwan</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="190" to="200" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Re-Decentralizing the Web, For Good This Time</title>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<idno type="DOI">10.1145/3591366.3591385</idno>
		<ptr target="https://ruben.verborgh.org/articles/redecentralizing-the-web/.doi:10.1145/3591366.3591385" />
	</analytic>
	<monogr>
		<title level="m">Linking the World&apos;s Information: Essays on Tim Berners-Lee&apos;s Invention of the World Wide Web</title>
				<editor>
			<persName><forename type="first">O</forename><surname>Seneviratne</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Hendler</surname></persName>
		</editor>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="215" to="230" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Personal data stores (PDS): A review</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">U</forename><surname>Fallatah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Barhamgi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Perera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page">1477</biblScope>
			<date type="published" when="2023">2023</date>
			<publisher>MDPI</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Towards usage control models: beyond traditional access control</title>
		<author>
			<persName><forename type="first">J</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sandhu</surname></persName>
		</author>
		<idno type="DOI">10.1145/507711.507722</idno>
		<idno>doi:10.1145/507711.507722</idno>
		<ptr target="https://doi.org/10.1145/507711.507722" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the seventh ACM symposium on Access control models and technologies, SAC-MAT &apos;02</title>
				<meeting>the seventh ACM symposium on Access control models and technologies, SAC-MAT &apos;02<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="57" to="64" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Usage Control Enforcement: Present and Future</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pretschner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hilty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Schütz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Schaefer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Walter</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSP.2008.101</idno>
		<ptr target="http://ieeexplore.ieee.org/document/4588229/.doi:10.1109/MSP.2008.101" />
	</analytic>
	<monogr>
		<title level="j">IEEE Security &amp; Privacy Magazine</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="44" to="53" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Wright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zhao</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2408.09071</idno>
		<idno type="arXiv">arXiv:2408.09071</idno>
		<ptr target="http://arxiv.org/abs/2408.09071.doi:10.48550/arXiv.2408.09071" />
		<title level="m">Me want cookie! Towards automated and transparent data governance on the Web</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">P</forename><surname>Krog</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ryan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Golpayegani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Flake</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2404.13426</idno>
		<idno type="arXiv">arXiv:2404.13426</idno>
		<ptr target="http://arxiv.org/abs/2404.13426.doi:10.48550/arXiv.2404.13426" />
		<title level="m">Data Privacy Vocabulary (DPV) -Version 2</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Machine Understandable Policies and GDPR Compliance Checking</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">M</forename><surname>Petrova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sauro</surname></persName>
		</author>
		<idno type="DOI">10.1007/s13218-020-00677-4</idno>
		<ptr target="https://doi.org/10.1007/s13218-020-00677-4.doi:10.1007/s13218-020-00677-4" />
	</analytic>
	<monogr>
		<title level="j">KI -Künstliche Intelligenz</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="303" to="315" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Towards Formal Semantics for ODRL Policies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Steyskal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Polleres</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-21542-6_23</idno>
	</analytic>
	<monogr>
		<title level="m">Rule Technologies: Foundations, Tools, and Applications</title>
				<editor>
			<persName><forename type="first">N</forename><surname>Bassiliades</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Sadri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Paschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Roman</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="360" to="375" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Using semantic web technologies and production rules for reasoning on obligations, permissions, and prohibitions</title>
		<author>
			<persName><forename type="first">N</forename><surname>Fornara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Colombetti</surname></persName>
		</author>
		<ptr target="https://content.iospress.com/articles/ai-communications/aic190617" />
	</analytic>
	<monogr>
		<title level="j">Ai Communications</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="319" to="334" />
			<date type="published" when="2019">2019</date>
			<publisher>IOS Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Akaichi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2203.04800</idno>
		<idno type="arXiv">arXiv:2203.04800</idno>
		<ptr target="http://arxiv.org/abs/2203.04800.doi:10.48550/arXiv.2203.04800" />
		<title level="m">Usage Control Specification, Enforcement, and Robustness: A Survey</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<ptr target="https://www.w3.org/TR/odrl-model/" />
		<title level="m">The Open Digital Rights Language (ODRL)</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
		<respStmt>
			<orgName>W3C Working Group</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A critical reflection on ODRL</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Kebede</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sileno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Van Engers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop on AI Approaches to the Complexity of Legal Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="48" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">ODRL policy modelling and compliance checking</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">De</forename><surname>Vos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Padget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Rules and Reasoning: Third International Joint Conference, RuleML+ RR 2019</title>
		<title level="s">Proceedings</title>
		<meeting><address><addrLine>Bolzano, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">September 16-19, 2019. 2019</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="36" to="51" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhao</surname></persName>
		</author>
		<title level="m">Perennial semantic data terms of use for decentralized web</title>
				<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Interoperable and Continuous Usage Control Enforcement in Dataspaces</title>
		<author>
			<persName><forename type="first">I</forename><surname>Akaichi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rojas Meléndez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Van Gheluwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bozzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<ptr target="https://raw.githubusercontent.com/woutslabbinck/papers/main/2024/Interoperable_and_Continuous_Usage_Control_Enforcement_in_Dataspaces.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Workshop on Semantics in Dataspaces</title>
				<meeting>the Second International Workshop on Semantics in Dataspaces</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Towards a personal data vault society: an interplay between technological and business perspectives</title>
		<author>
			<persName><forename type="first">S</forename><surname>Verbrugge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Vannieuwenborg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Van Der Wee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Colle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Taelman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2021 60th FITCE Communication Days Congress for ICT Professionals: Industrial Data-Cloud, Low Latency and Privacy (FITCE), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Sambra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mansour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hawke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zereba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ghanem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zagidulin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Aboulnaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<title level="m">Solid: A Platform for Decentralized Social Applications Based on Linked Data</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page">16</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Using the ODRL profile for access control for solid pod resource governance</title>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rodríguez-Doncel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mondada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mcbennett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Semantic Web Conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="16" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A Policy-Oriented Architecture for Enforcing Consent in Solid</title>
		<author>
			<persName><forename type="first">L</forename><surname>Debackere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Taelman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<idno type="DOI">10.1145/3487553.3524630</idno>
		<idno>doi:</idno>
		<ptr target="10.1145/3487553.3524630" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd International Workshop on Consent Management in Online Services, Networks and Things</title>
				<meeting>the 2nd International Workshop on Consent Management in Online Services, Networks and Things</meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="516" to="524" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Enforcing Usage Control Policies in Solid Using a Rule-Based Software Agent</title>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rojas Meléndez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<ptr target="https://pod.woutslabbinck.com/WIP/24-03-26_SoSy2024___Solid_Agent_for_UCP.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second Solid Symposium</title>
				<meeting>the Second Solid Symposium</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Greater control and transparency in personal data processing</title>
		<author>
			<persName><forename type="first">G</forename><surname>Havur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vander Sande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th International Conference on Information Systems Security and Privacy, SciTePress</title>
				<meeting>the 6th International Conference on Information Systems Security and Privacy, SciTePress</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="655" to="662" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Nagel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lycklama</surname></persName>
		</author>
		<idno type="DOI">10.5281/zenodo.5105744</idno>
		<ptr target="https://zenodo.org/records/5105744.doi:10.5281/zenodo.5105744" />
		<title level="m">Design Principles for Data Spaces -Position Paper</title>
				<meeting><address><addrLine>Zenodo</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Building a Dataspace: Technical Overview</title>
		<author>
			<persName><forename type="first">V</forename><surname>Siska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Karagiannis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drobics</surname></persName>
		</author>
		<ptr target="https://www.gaia-x.at/wp-content/uploads/2023/04/WhitepaperGaiaX.pdf" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Drees</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">O</forename><surname>Kubitza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lipp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pretzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Langdon</surname></persName>
		</author>
		<ptr target="https://www.researchgate.net/profile/Johannes-Theissen-Lipp/publication/351519610_Mobility_Data_" />
		<title level="m">Mobility data space-first implementation and business opportunities</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note>ITS World Congress</note>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<ptr target="/links/610101882bf3553b29174ee6/Mobility-Data-Space-First-Implementation-and-Business-Opportunities.pdf" />
		<title level="m">Space_-_First_Implementation_and_Business_Opportunities</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">The Web and Linked Data as a Solid Foundation for Dataspaces</title>
		<author>
			<persName><forename type="first">S</forename><surname>Meckler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dorsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Henselmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
		<idno type="DOI">10.1145/3543873.3587616</idno>
		<idno>doi:</idno>
		<ptr target="10.1145/3543873.3587616" />
	</analytic>
	<monogr>
		<title level="m">Companion Proceedings of the ACM Web Conference 2023</title>
				<meeting><address><addrLine>Austin TX USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1440" to="1446" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">The Rights Delegation Proxy: An Approach for Delegations in the Solid Dataspace</title>
		<author>
			<persName><forename type="first">S</forename><surname>Schmid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schraudner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Harth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Workshop on Semantics in Dataspaces</title>
				<meeting>the Second International Workshop on Semantics in Dataspaces</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Linked Data Event Streams in Solid containers</title>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vasireddy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</author>
		<ptr target="https://raw.githubusercontent.com/woutslabbinck/papers/main/2022/Linked_Data_Event_Streams_in_Solid_containers.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th Workshop on Managing the Evolution and Preservation of the Data Web</title>
				<meeting>the 8th Workshop on Managing the Evolution and Preservation of the Data Web</meeting>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">A Rule-Based Software Agent on Top of Personal Data Stores</title>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rojas Meléndez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd International Semantic Web Conference: Posters, Demos, and Industry Tracks</title>
				<meeting>the 22nd International Semantic Web Conference: Posters, Demos, and Industry Tracks</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">What&apos;s in a Pod? -A knowledge graph interpretation for the Solid ecosystem</title>
		<author>
			<persName><forename type="first">R</forename><surname>Dedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hochstenbach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<ptr target="iSSN:1613-0073" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th Workshop on Storing, Querying and Benchmarking Knowledge Graphs</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Saleem</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A.-C. Ngonga</forename><surname>Ngomo</surname></persName>
		</editor>
		<meeting>the 6th Workshop on Storing, Querying and Benchmarking Knowledge Graphs</meeting>
		<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3279</biblScope>
			<biblScope unit="page" from="81" to="96" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<title level="m" type="main">From Resource Control to Digital Trust with User-Managed Access</title>
		<author>
			<persName><forename type="first">W</forename><surname>Termont</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">D</forename><surname>Meester</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2411.05622</idno>
		<idno type="arXiv">arXiv:2411.05622</idno>
		<ptr target="http://arxiv.org/abs/2411.05622.doi:10.48550/arXiv.2411.05622" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">The Community Solid Server: Supporting research &amp; development in an evolving ecosystem</title>
		<author>
			<persName><forename type="first">J</forename><surname>Van Herwegen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<idno type="DOI">10.3233/SW-243726</idno>
		<ptr target="https://www.medra.org/servlet/aliasResolver?alias=iospress&amp;doi=10.3233/SW-243726.doi:10.3233/SW-243726" />
	</analytic>
	<monogr>
		<title level="m">Semantic Web</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="1" to="15" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
