<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enforcing Usage Control Policies in Solid using Rule-Based Web Agents</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Wout</forename><surname>Slabbinck</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">IDLab</orgName>
								<orgName type="department" key="dep2">Departement of Electronics and Information Systems</orgName>
								<orgName type="institution">Ghent University -imec</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Julián</forename><forename type="middle">Andrés</forename><surname>Rojas</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">IDLab</orgName>
								<orgName type="department" key="dep2">Departement of Electronics and Information Systems</orgName>
								<orgName type="institution">Ghent University -imec</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Beatriz</forename><surname>Esteves</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">IDLab</orgName>
								<orgName type="department" key="dep2">Departement of Electronics and Information Systems</orgName>
								<orgName type="institution">Ghent University -imec</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ruben</forename><surname>Verborgh</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">IDLab</orgName>
								<orgName type="department" key="dep2">Departement of Electronics and Information Systems</orgName>
								<orgName type="institution">Ghent University -imec</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Pieter</forename><surname>Colpaert</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">IDLab</orgName>
								<orgName type="department" key="dep2">Departement of Electronics and Information Systems</orgName>
								<orgName type="institution">Ghent University -imec</orgName>
								<address>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enforcing Usage Control Policies in Solid using Rule-Based Web Agents</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">1480AA70A1B267B653869EF9B9482FA3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:33+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Solid</term>
					<term>Access Control</term>
					<term>Usage Control</term>
					<term>Enforcement</term>
					<term>Policy</term>
					<term>Intelligent software web agents</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A core feature of the Solid ecosystem is enabling the sharing of data resources with other agents using access control policies. However, the decision of allowing access (or not) to a given data resource may not be final and might need to change over time. The Solid authorization specifications do not allow expressing and thus neither enforcing complex constraints (e.g., temporal) on access or more generally, usage policies. A policy language that does have the expressivity to declare permission rules, including temporal constraints, is the Open Digital Rights Language (ODRL) W3C standard. To support and enforce ODRL policies over Solid resources, we design and implement a Web agent-based solution where an agent (i) decomposes ODRL policies into actionable tasks (such as granting and retracting access to resources) using declarative condition-action rules and; (ii) takes care of executing such tasks. Usage control within Solid can be delegated to agents such that neither applications nor users within the ecosystem need to ensure that access permissions over their data resources are valid and up to date. We show how the expressivity limitations for usage control of the current Solid specifications could be addressed by supporting ODRL via long-running Web agents with the task of enforcement. Since currently all data-sharing actions within the Solid ecosystem are manually executed by the owner of the resource, future work includes automating policy-based negotiation processes among actors through Web agents.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The Solid protocol 1 is a Personal Data Store Web technology that enables individuals to store and govern data on their data space, in Solid terminology also referred to as pod. A Solid server must support at least one of the two authorization specifications, namely the Web Access 2nd Solid Symposium, 2-3 May 2024, Leuven * Corresponding author.</p><p>wout.slabbinck@ugent.be (W. Slabbinck); julianandres.rojasmelendez@ugent.be (J. A. Rojas); beatriz.esteves@UGent.be (B. Esteves); ruben.verborgh@ugent.be (R. Verborgh); pieter.colpaert@ugent.be (P. Colpaert) https://woutslabbinck.com/ (W. Slabbinck); https://julianrojas.org/ (J. A. Rojas); https://besteves4.github.io/ (B. Esteves); https://ruben.verborgh.org/ (R. Verborgh); https://pietercolpaert.be/ (P. Colpaert) 0000-0002-3287-7312 (W. Slabbinck); 0000-0002-6645-1264 (J. A. Rojas); 0000-0003-0259-7560 (B. Esteves); 0000-0002-8596-222X (R. Verborgh); 0000-0001-6917-2167 (P. Colpaert) Control (WAC) <ref type="foot" target="#foot_0">2</ref> specification and/or the Access Control Policy (ACP) Language <ref type="foot" target="#foot_1">3</ref> , such that a user can declare access control rules over resources in their pod. To this date, however, these specifications do not support fine-grained access rules with temporal conditions. As a result, users must either for revocation re-configure the access control resources again after access was granted, or use a Solid application that can perform the granting and revoking access. However, neither option is infallible. In the first option, users must adjust rules to revoke access, yet human forgetfulness may allow unintended authorizations to persist. For the second option, due to the Web-based nature of the Solid protocol, the application must remain open and active for revocation to occur. This means that a Web client application is not sufficient. The first aspect to overcome the limitations of current specifications is to use another standard which supports fine-grained conditions to declare and enforce policies such as the Open Digital Rights Language (ODRL) <ref type="foot" target="#foot_2">4</ref> W3C standard <ref type="bibr" target="#b0">[1]</ref>. Since Solid only supports the aforementioned specifications, ODRL can not directly be enforced. However, it is possible to partially materialize ODRL to existing access rules that the Solid protocol can enforce. Furthermore, a continuously running Web service is required to overcome the manual and Web client revocation limitation.</p><p>In this paper, we extend an open-source, rule-based Web agent <ref type="bibr" target="#b1">[2]</ref> to (i) perceive policies from an ODRL policy Knowledge Graph (KG), managed by the resource owner, (ii) interpret those ODRL policies and transform them to Access Control Resources (ACR) rules as defined by ACP, and (iii) perform long-running tasks to enforce temporal usage control policies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Sambra et al. <ref type="bibr" target="#b2">[3]</ref> introduced Solid with the aim of letting users control their data on the Web by decoupling data from applications. To reach this goal, the protocol builds upon existing W3C standards and specifications to define a data storage, commonly referred to as Solid pod despite the lack of a precise definition <ref type="bibr" target="#b3">[4]</ref>. The Linked Data Platform<ref type="foot" target="#foot_3">5</ref> (LDP) W3C standard <ref type="bibr" target="#b4">[5]</ref> is leveraged in Solid to read and write to this storage, which consists of a collection of resources. An agent is identified through a WebID 6 and through Solid-OIDC <ref type="foot" target="#foot_4">7</ref> the claim of their identity can be verified by an authoritative Identity Provider (IDP). The current access control protocols, WAC and ACP, allow users to define which party (or agent) can act on a given resource.</p><p>However, complying with the General Data Protection Regulation (GDPR) <ref type="bibr" target="#b5">[6]</ref> is impossible since extra requirements such as the purpose of data use (Article 13.1(c) and Article 14.1(c)) and retention period (Article 13.2(a) and Article 14.2(a)) can neither be encoded in WAC nor ACP. To overcome these challenges, Esteves et al. <ref type="bibr" target="#b6">[7]</ref> introduced the ODRL Profile for Access Control <ref type="foot" target="#foot_5">8</ref> (OAC) which aims to align access and usage permissions with GDPR for Solid. This is achieved through modelling usage control policies with the Open Digital Rights Language   <ref type="formula">1</ref>), (ii) Alice updating the UCP KG with a duration-restricted policy ( <ref type="formula">2</ref>), (iii) the agent listening and fetching the policy (3), planning its tasks through reasoning (4) and executing them <ref type="bibr" target="#b4">(5,</ref><ref type="bibr" target="#b6">7)</ref>, and (iv) Bob having access for 30 seconds <ref type="bibr" target="#b5">(6,</ref><ref type="bibr" target="#b7">8)</ref>.</p><p>(ODRL) <ref type="bibr" target="#b0">[1]</ref> and using the Data Privacy Vocabulary (DPV) <ref type="foot" target="#foot_6">9</ref>  <ref type="bibr" target="#b7">[8]</ref> for representing data processing aspects. Usage control policies can model purpose and temporal constraints, where the latter could address the retention requirement. To the best of our knowledge, however, there is to this day no enforcement of ODRL policies and, by extension, no AOC enforcement mechanism. In general, Havur et al. <ref type="bibr" target="#b8">[9]</ref> state that the enforcement of usage control in a decentralized setting is an open research challenge. Akaichi et al. contributed to this research problem by introducing a conceptual usage control framework to achieve continuous enforcement of usage control in a decentralized ecosystem <ref type="bibr" target="#b9">[10]</ref>.</p><p>An alternative approach for enforcing access control has been introduced by Grau et al. <ref type="bibr" target="#b10">[11]</ref> through a demonstration of agent-based access control enforcement. However, this approach is limited by its reliance on ad-hoc rules tailored to their specific use case. Furthermore, it does not accommodate additional conditions such as the temporal domain.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Demo</head><p>To demonstrate the enforcement of a temporal ODRL policy, we elaborate the use case of a Solid pod owner, Alice, who wants to share resource X for a limited amount of time with another actor Bob. It is assumed she has a policy Knowledge Graph (KG) to which her Web agent is subscribed and that the Web agent has acl:Control permission to the resources in Alice her pod.</p><p>To start sharing resource X, Alice adds the data usage ODRL policy shown in Listing 1 to the KG: Alice gives read access to Bob for the duration of 30 seconds. Next, the agent is notified that the policy has been added to the Usage Control Policy (UCP) KG and the agent fetches this policy. The duration policy is passed to a reasoner, which results in an action plan with two concrete actions to be performed: (i) The authorization resource of X must be updated such that Bob has read access and (ii) In 30 seconds, the authorization resource of X must be updated such that Bob has no longer access. The agent performs (i) and starts a CronJob for 30 seconds to remove Bob's access to X. Finally, after 30 seconds have passed, the agent sends another request to the authorization resource of X such that Bob has no more access. A screencast in the open-source Solid Agent GitHub repository demonstrates the enforcement flow<ref type="foot" target="#foot_7">10</ref> described at the beginning of this section and illustrated in 1.</p><p>ex:policy a odrl:Offer; odrl:permission ex:temporalPermission.</p><p>ex:temporalPermission a odrl:Permission ; odrl:action odrl:read ; odrl:constraint ex:durationConstraint ; odrl:target ex:resourceX ; odrl:assignee ex:Bob .</p><p>ex:durationConstraint odrl:leftOperand odrl:elapsedTime ; odrl:operator odrl:eq ; odrl:rightOperand "PT30S"^^xsd:duration .</p><p>Listing 1: A duration-restricted ODRL policy issued by Alice stating that Bob has read access to resource X for a duration of 30 seconds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Materialization of the ODRL policy by the Solid Agent</head><p>The Solid Agent operates in the environment of the UCP KG and the Solid pod of Alice. Where in the former, the agent listens to changes by being notified by the KG, it actuates in the latter through HTTPS requests to Access Control Resources. The actuations are driven by the input through condition-action rules. In the Solid Agent, these are implemented through Koreografeye <ref type="bibr" target="#b11">[12]</ref>, which separates the planning from the execution. In Koreografeye, reasoning over Notation3<ref type="foot" target="#foot_8">11</ref> (N3) rules is performed to generate a plan consisting of multiple tasks. In a second phase, these tasks are then executed through Koreografeye plugins <ref type="foot" target="#foot_9">12</ref> that execute Typescript 13 code. Since Koreografeye is domain-agnostic, it neither understands ODRL nor Solid, dedicated N3 rules and plugins are written to materialize a temporal ODRL policy to concrete Access Control Resource at the pod level. For brevity and due to the fact everything is open-source 14 , we chose to use a shorthand notation to make clear how the materialization process works and why rather than explain this via code, RDF and Notation3 rules.</p><p>• Deontic concept D: It is only possible for this to be instantiated as Permission or Prohibition since there is no concept of Duty or Dispensation in ACP. In ODRL this is represented by the class of a rule. • Subject S: The WebID of the party that is subject to the rule.</p><p>• Action A: The allowed action of a rule that a subject can execute on a resource. • Resource R: The target resource to which the subject of a rule is allowed to perform a given action. • Duration-restricted constraint p: The duration of how long the rule is active. This period is represented using an RDF literal of type xsd:duration. • Time t: A representation of time of type xsd:dateTime.</p><p>• A Koreografeye action Action: A Koreografeye Plugin 12 that performs a dedicated execution task.</p><p>Using the shorthand, a general duration-restricted ODRL Rule is D(S, A, R, p) and Permission(ex:Bob, odrl:read, ex:ResourceX, "PT30S"^^xsd:duration) is the instantiated example at Listing 1. The two actions the agent can perform are ChangeAuthorization(D(S, A, R)) and CronJob(t, Action). The former changes the authorization resource of R using the deontic concept, subject and action. The latter executes another action at time t. On a policy update at time 𝑡 1 , the agent thus performs the condition-action rule:</p><formula xml:id="formula_0">IF Permission(S, A, R, p) 𝑡 1</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>THEN</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ChangeAuthorization(Permission(S, A, R))</head><p>CronJob(𝑡 1 + p, ChangeAuthorization(Prohibition(S, A, R)))</p><p>Instantiated with Listing 1 at time "2024-06-05T12:00:00"^^xsd:dateTime, two actions need to be executed: (i) ChangeAuthorization(Permission(ex:Bob, acl:read, ex:resourceX)), and (ii) CronJob("2024-06-05T12:00:30"^^xsd:dateTime, ChangeAuthorization(Prohibition (ex:Bob, acl:read, ex:resourceX))) 15  Listing 2: The materialization as an Access Control Resource as defined by ACP of the duration ODRL Policy stating Bob has read access to resource X.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Discussion</head><p>The demonstration shows an agent-based method of enforcing temporal usage control policies on Solid pods using ODRL without altering the Solid Protocol. This is achieved through materializing the ODRL to Solid authorization resources and demonstrated with ACP as it would also allow restricting the client and issuer of the assignee. For this, OAC has to be used as policy language as core ODRL does not define solid client and issuer restrictions. However, the Solid Agent solution for enforcing UCP policies comes with some limitations. A first limitation is the necessity that the agent has complete control over all the resources owned by the resource owner in order to alter the authorization resources. Resource owners must trust that the agent will not misuse its control authority. However, there are no guarantees that the agent would never modify authorization resources without the consent of the owner and refrain from accessing the contents of the resources themselves. Certification of agents could potentially resolve this issue. The UCP KG introduces a challenge where the agent executes all newly added policies directly, even those that conflict with existing policies, causing inconsistencies in authorization resources. To resolve this, approaches such as those suggested in GUCON <ref type="bibr" target="#b12">[13]</ref> are crucial to prohibit conflicting policies from entering the UCP KG.</p><p>Finally, full core ODRL will never be possible to be supported using our presented enforcement mechanism. There are several ODRL constraint left operands such as cardinality (odrl:count) or purpose (odrl:purpose) that cannot be expressed in Solid. As a result, next to materialization, additional approaches need to be explored to support full ODRL enforcement over Solid resources.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>In this paper, we demonstrate how temporal usage control policies can be enforced in the Solid ecosystem by employing ODRL and a Web agent. Adhering strictly to the Solid protocol reveals that only a limited amount of usage control policies can be enforced. Enforcing a larger set of policies will require changes to the way authorization is granted within Solid. To enforce ODRL in Solid, we decided how to interpret ODRL to materialize this in access control resources due to a lack of ODRL formalization. However, such formalization is essential for verifying Web agents and as a consequence ensuring trust. Future work may include negotiation over usage control policies with Web agents such that other actors can initiate asking permission.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Enforcement flow showing (i) Bob not having access to X (1), (ii) Alice updating the UCP KG with a duration-restricted policy (2), (iii) the agent listening and fetching the policy (3), planning its tasks through reasoning (4) and executing them<ref type="bibr" target="#b4">(5,</ref><ref type="bibr" target="#b6">7)</ref>, and (iv) Bob having access for 30 seconds<ref type="bibr" target="#b5">(6,</ref><ref type="bibr" target="#b7">8)</ref>.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>. This results in ChangeAuthorization immediately adding Listing 2 to the Access Control Resource accompanying resource X and after 30 seconds removing Listing 2 again.</figDesc><table><row><cell>acp:apply [</cell></row><row><cell>a acp:Policy ;</cell></row><row><cell>acp:allow acl:Read ;</cell></row><row><cell>acp:anyOf [</cell></row><row><cell>a acp:Matcher ;</cell></row><row><cell>acp:agent ex:Bob</cell></row><row><cell>]</cell></row><row><cell>] .</cell></row><row><cell>&lt;#acr&gt; a acp:AccessControlResource ;</cell></row><row><cell>acp:resource ex:resourceX ;</cell></row><row><cell>acp:accessControl &lt;#bobReadAccess&gt; .</cell></row><row><cell>&lt;#bobReadAccess&gt; a acp:AccessControl ;</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">https://solidproject.org/TR/wac</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_1">https://solidproject.org/TR/acp</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_2">https://www.w3.org/TR/odrl-model/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_3">https://www.w3.org/TR/ldp/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_4">https://solidproject.org/TR/oidc</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_5">https://w3id.org/oac</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_6">https://w3id.org/dpv/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_7">https://github.com/SolidLabResearch/Solid-Agent/tree/feat/sosy/documentation/sosy</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="11" xml:id="foot_8">https://w3c.github.io/N3/spec/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="12" xml:id="foot_9">https://github.com/eyereasoner/Koreografeye-Plugin</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="13" xml:id="foot_10">https://www.typescriptlang.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="14" xml:id="foot_11">https://github.com/SolidLabResearch/Solid-Agent/tree/feat/sosy/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Supported by SolidLab Vlaanderen (Flemish Government, EWI and RRF project VV023/10) and SYTADEL (SYnchromodal proTotype for Data Sharing and PLanning), c-SBO project( VIL, imec, UAntwerpen and Vlerick), funded by VLAIO. The authors would like to thank Ruben Dedecker, Patrick Hochstenbach and Jos De Roo for giving their insights and feedback regarding this work.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www.w3.org/TR/odrl-model/,2018" />
		<title level="m">The open digital rights language (odrl)</title>
				<imprint/>
	</monogr>
	<note>W3C Working Group</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A rule-based software agent on top of personal data stores</title>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rojas Meléndez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd International Semantic Web Conference: Posters, Demos, and Industry Tracks</title>
				<meeting>the 22nd International Semantic Web Conference: Posters, Demos, and Industry Tracks</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Sambra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mansour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hawke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zereba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ghanem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zagidulin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Aboulnaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<title level="m">Solid: A Platform for Decentralized Social Applications Based on Linked Data</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page">16</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">What&apos;s in a Pod? -A knowledge graph interpretation for the Solid ecosystem</title>
		<author>
			<persName><forename type="first">R</forename><surname>Dedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hochstenbach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<ptr target="iSSN:1613-0073" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th Workshop on Storing, Querying and Benchmarking Knowledge Graphs</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Saleem</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A.-C. Ngonga</forename><surname>Ngomo</surname></persName>
		</editor>
		<meeting>the 6th Workshop on Storing, Querying and Benchmarking Knowledge Graphs</meeting>
		<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3279</biblScope>
			<biblScope unit="page" from="81" to="96" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Speicher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Arwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Malhotra</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/ldp/" />
		<title level="m">Linked Data Platform 1</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">0</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Regulation (EU</title>
		<ptr target="https://eur-lex.europa.eu/eli/reg/2016/679/oj" />
	</analytic>
	<monogr>
		<title level="m">European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation)</title>
				<imprint>
			<date type="published" when="2016">2016. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Using the ODRL profile for access control for solid pod resource governance</title>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rodríguez-Doncel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mondada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mcbennett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Semantic Web Conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="16" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">P</forename><surname>Krog</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ryan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Golpayegani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Flake</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2404.13426</idno>
		<idno type="arXiv">arXiv:2404.13426</idno>
		<ptr target="http://arxiv.org/abs/2404.13426.doi:10.48550/arXiv.2404.13426" />
		<title level="m">Data Privacy Vocabulary (DPV) -Version 2</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Greater control and transparency in personal data processing</title>
		<author>
			<persName><forename type="first">G</forename><surname>Havur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vander Sande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th International Conference on Information Systems Security and Privacy</title>
				<meeting>the 6th International Conference on Information Systems Security and Privacy</meeting>
		<imprint>
			<publisher>SciTePress</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="655" to="662" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Interoperable and Continuous Usage Control Enforcement in Dataspaces</title>
		<author>
			<persName><forename type="first">I</forename><surname>Akaichi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Slabbinck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rojas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">V</forename><surname>Gheluwe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bozzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<ptr target="1613-0073" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Workshop on Semantics in Dataspaces (SDS 2024)</title>
		<title level="s">CEUR Workshop Proceedings, CEUR</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Theissen-Lipp</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Colpaert</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Sowe</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Curry</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Decker</surname></persName>
		</editor>
		<meeting>the Second International Workshop on Semantics in Dataspaces (SDS 2024)<address><addrLine>Hersonissos, Greece</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3705</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Gaze-based Opportunistic Privacypreserving Human-Agent Collaboration</title>
		<author>
			<persName><forename type="first">J</forename><surname>Grau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Strecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Garcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bektas</surname></persName>
		</author>
		<idno type="DOI">10.1145/3613905.3651066</idno>
		<idno>doi:10.1145/3613905.3651066</idno>
		<ptr target="https://doi.org/10.1145/3613905.3651066" />
	</analytic>
	<monogr>
		<title level="m">Extended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems, CHI EA &apos;24</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Using Event Notifications, Solid and Orchestration for Decentralizing and Decoupling Scholarly Communication</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hochstenbach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Verborgh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">V D</forename><surname>Sompel</surname></persName>
		</author>
		<ptr target="https://journal.code4lib.org/articles/17823" />
	</analytic>
	<monogr>
		<title level="j">The Code4Lib Journal</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">GUCON: A Generic Graph Pattern Based Policy Framework for Usage Control Enforcement</title>
		<author>
			<persName><forename type="first">I</forename><surname>Akaichi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Flouris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Fundulaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-45072-3_3</idno>
		<ptr target="https://link.springer.com/10.1007/978-3-031-45072-3_3.doi:10.1007/978-3-031-45072-3_3" />
	</analytic>
	<monogr>
		<title level="m">Rules and Reasoning</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Fensel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Ozaki</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Roman</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Soylu</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature Switzerland</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">14244</biblScope>
			<biblScope unit="page" from="34" to="53" />
		</imprint>
	</monogr>
	<note>Lecture Notes in Computer Science</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
