<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>L. Martín-Núñez);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Service for Decentralised and Policy-Aware Ecosystems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lucía Martín-Núñez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea Cimmino</string-name>
          <email>andreajesus.cimmino@upm.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Raúl García-Castro</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Data usage control</institution>
          ,
          <addr-line>ODRL Policies, ODRL Directory</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universidad Politécnica de Madrid</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Policies are a critical component in decentralised data ecosystems, where ensuring secure and compliant data usage is an ever-growing challenge. The W3C standard Open Digital Rights Language (ODRL) has been widely adopted for expressing access and usage control policies by several initiatives, such as Data Spaces and Solid Pods. However, ODRL has only promoted an ontology to express policies without any standardised recommendation for policy management, discovery, or enforcement. Although several proposals outside the standard have been presented to address these limitations, a complete solution to be deployed by decentralised initiatives like Data Spaces or Solid remains unexplored. This article introduces the ODRE Policy Directory Service (ODRE-PDS), a Web service that provides the features needed to rely on ODRL in practical scenarios and use cases. The directory includes policy management features, discovery, policy enforcement mechanisms, and an architecture that facilitates its integration with external trust-based systems. The directory has been used in two use cases: a time-based policy scenario and an AI-driven facial recognition access control system. In addition, several experiments on enforcement performance, scalability, and computational overhead advocate its usability by decentralised ecosystems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        the General Data Protection Regulation (GDPR) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and the Digital EU Artificial Intelligence Act [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The
W3C standardisation group Open Digital Rights Language (ODRL) has published as a recommendation a
semantic model [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], i.e., an ontology, to define access and usage control policies. However, ODRL focuses
on policy specification and lacks recommendations for other related policy tasks such as discovery or
enforcement mechanisms. As a result, there are no standard guidelines on how to operationalise or
implement these features within policy-aware service architectures.
      </p>
      <p>Outside the standard, several proposals have been presented to rely on ODRL in real-world scenarios,
tackling problems such as policy specification, policy management, policy enforcement, or supporting
diferent scenarios; from known access control to usage control. However, up to the authors’ knowledge,
despite the numerous proposals, no existing proposal ofers a comprehensive solution that combines
all these features, providing a general Web-service-orientated architecture suitable for decentralised
infrastructures.</p>
      <p>In this article, the ODRE Policy Directory Service (ODRE-PDS) is introduced to address these
limitations. ODRE-PDS is a Web service designed with a modular architecture that supports the management,
(R. García-Castro)</p>
      <p>CEUR
Workshop
Proceedings</p>
      <p>
        ceur-ws.org
ISSN1613-0073
discovery, and enforcement of ODRL policies via a RESTful interface. The ODRE-PDS follows a design
that aligns with W3C standards, for instance, supporting diferent RDF serialisations and the SPARQL
protocol and queries. The ODRE-PDS follows an approach applied to other policy-related initiatives
where there is a service, or several components, providing the aforementioned features; like XACML [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The contributions of the ODRE-PDS address three limitations in current ODRL-based initiatives: (i)
it provides policy management capabilities and provides discovery features over stored policies; (ii)
it enables policy enforcement based on contextual information, including data stored in or retrieved
through ODRE-PDS; and (iii) it provides an out-of-the-box implementation ready to use in real-world
scenarios or infrastructures such as Solid Pods and European Data Spaces.</p>
      <p>To showcase the ODRE-PDS integration in real-world scenarios, the article presents two use cases
derived from the European project AURORAL1 where the directory has been adopted and a Spanish
National Project. The first entails time-restricted access to public documents based on policies, and the
second relies on policies that grant access to documents based on biometric recognition for identity
verification. These scenarios demonstrate context-aware and auditable enforcement capabilities while
maintaining compatibility with the ODRL model. In addition, three experiments have been carried out
to test the ODRE-PDS performance, the results of which advocate the suitability of the directory to be
used in real-world use cases.</p>
      <p>This rest of the paper is organised as follows: Section 2 surveys similar proposals in the literature,
then in Section 3 an implementation agnostic architecture is presented for the ODRE-PDS, and in
Section 4, a specific implementation is introduced. Section 6 presents the experiments carried out and,
ifnally, Section 7 states the conclusions of the article.</p>
    </sec>
    <sec id="sec-2">
      <title>2. State of the Art</title>
      <p>
        Enforcing policies, regardless of access or usage control, is a critical challenge for data-centric
environments and particularly decentralised ecosystems, such as the Internet of Things (IoT) [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], Solid
Pods [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and European Data Spaces [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In these contexts, data governance is increasingly based on
self-sovereign and federated approaches [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where control must be preserved beyond initial access
decisions. This paradigm is known as usage control, which extends traditional access control by ensuring
that data consumers continue to respect policy constraints after access has been granted [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. To enable
reliable and interoperable data sharing, policy initiatives must support diferent operations such as
policy specification, the enforcement of access and usage control.
      </p>
      <p>This section analyses the capabilities of existing policy initiatives for management and enforcement
in decentralised privacy-sensitive systems. The analysis is structured around the following evaluation
dimensions: A) Policy specification : the type of model promoted by the diferent initiatives to express
the policies (e.g., an ontology or an XML schema); B) Policy management: the initiative promotes
an architecture, software or service oriented, to support policy management operations, i.e., CRUD
operations (create, read, update, or delete); C) Policy enforcement: the initiative promotes an architecture,
software or a service oriented, to evaluate policies taking into account the state of the world. The state
of the world (SoTW) refers to the external contextual information used to evaluate the policy, such
as time, identity, or environmental factors.; D) Access control: the initiative supports authorization
mechanisms that enforce explicit allow/deny decisions over resource access, typically based on the
identity of the requester and policy rules; E) Monitoring: the initiative promotes a software or service
that supports usage control, that is, the ability to observe and track policy compliance over time; F)
Operations interface: the type of interface exposed by the initiative to manage and evaluate policies.
This may include RESTful APIs, SPARQL endpoints, command-line tools, or web-based dashboards.
Table 1 shows the summary of the analysis performed in four well-known policy initiatives.</p>
      <p>
        ODRL [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is a W3C recommendation that provides a formal ontology to define access and usage
control policies through permissions, prohibitions, and obligations. It supports policy specification using
RDF and following the model of its ontology; which is aligned with Linked Data principles [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However,
      </p>
      <sec id="sec-2-1">
        <title>1See https://auroral-project.eu/, Horizon 2020, Grant Agreement ID: 101016854.</title>
        <sec id="sec-2-1-1">
          <title>Feature</title>
          <p>A) Policy specification
B) Policy management
C) Policy enforcement
D) Access control
E) Monitoring
F) Operations interface</p>
          <p>
            ODRL does not provide recommendations for policy enforcement, discovery, or policy management.
Furthermore, the ODRL initiative does not provide any means to adopt policies in practical scenarios
besides using them for descriptive purposes; the standard does not provide any service-based interface
or component-based architecture [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. Nevertheless, recent eforts, such as the ODRL profile for
expressing consent in Solid environments [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ] advocate its potential for granular policy specification
in decentralised systems. However, these eforts remain limited in their ability to ofer executable or
integrated enforcement features.
          </p>
          <p>
            XACML [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ], developed by OASIS, defines both a policy language and a reference architecture for
access control, based on the interaction between Policy Decision Points (PDPs), Policy Enforcement
Points (PEPs) and Policy Action Point (PAP). It supports policy specification using XML and following a
particular XML schema and provides real-time access decisions via service-based interfaces. In addition,
XACML includes policy management operations or monitoring capabilities; however, it lacks support
for ontology-based semantics or dynamic usage control. The XACML standard is suited for static access
control scenarios in centralized environments.
          </p>
          <p>
            Usage CONtrol (UCON) [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] is a conceptual model that allows to describe mutability of the attributes,
representing those that may change during access, and allows to describe continuity, which enables
policy evaluation before, during, and after access. It defines policies through a formal model and
supports enforcement mechanisms across the access lifecycle. UCON provides conceptual support for
monitoring, but lacks standardized implementations, semantic modeling, integration interfaces, and
policy management functionality. It is primarily used in academic or prototype contexts requiring
persistent and adaptive control [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ].
          </p>
          <p>
            LegalRuleML [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], also developed by OASIS, is an XML-based legal rule language designed to
represent legal logic, rights, and obligations. It enables the specification of normative rules through a
structured, formal model that supports advanced compliance reasoning. However, it does not support
policy enforcement, runtime monitoring, or policy management operations. LegalRuleML also lacks
support for access control (AC) mechanisms and does not provide service-level interfaces for integration
in operational systems. As such, it is primarily suited for ofline legal analysis, documentation, and
regulatory alignment, rather than for executable policy enforcement.
          </p>
          <p>As summarised in Table 1, none of the reviewed initiatives simultaneously supports semantic
modelling based on ontologies, policy enforcement at runtime, and integration with operational
infrastructures. In particular, the absence of monitoring capabilities and dynamic adaptability restricts their
applicability in decentralized ecosystems where authorizations and contextual conditions evolve over
time.
2.1. ODRL-Based Enforcement Frameworks
Since this article focuses on ODRL-based proposals and ODRL lacks recommendations in addition to
the ontology, this subsection reviews recent frameworks and proposals that extend the W3C ODRL
2.2 specification with additional semantics or mechanisms not covered by the oficial standard. These
proposals rely on the semantics and vocabulary of ODRL, but difer in how they are used to manage,
discover, or enforce policies.</p>
          <p>
            Because ODRL does not provide native support for policy execution [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ], several initiatives have
emerged to bridge the gap between policy specification and enforcement. Table 2 presents a comparative
analysis of these proposals using the evaluation dimensions introduced earlier, including a new criterion
G) Types of constraints: that each framework supports during policy evaluation (e.g., static vs. dynamic).
This dimension highlights whether the frameworks rely solely on preconfigured values (static) or are
capable of processing runtime values provided as context before the enforcement by the system or a
third-party entity (dynamic).
          </p>
          <p>
            ODRL Policy Modelling [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ] explores how ODRL policies can be aligned with legal regulations,
focusing on formal compliance checking. The framework provides reasoning mechanisms over
policy expressions to detect inconsistencies and evaluate whether they fulfill regulatory requirements.
However, it does not include any policy enforcement at runtime, monitoring, or API integration features.
          </p>
          <p>
            DUC [
            <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
            ] and IntentKeeper [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ] are ODRL-based frameworks designed for specific application
domains: industrial IoT and federated learning, respectively. Both provide RESTful APIs that allow
external systems to interact with policy evaluation services at runtime, enabling practical policy
enforcement. They incorporate basic enforcement mechanisms over data access and transmission, but
do not include support for access control or runtime monitoring of policy compliance.
          </p>
          <p>
            ODRL-PAP [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] is a policy administration component that enables the transformation of ODRL
policies into executable Rego rules for enforcement via the Open Policy Agent (OPA). Policies are
specified in ODRL and automatically compiled into enforcement-ready logic. The system provides a
REST API for the creation, retrieval, and deletion of policies, supporting external integration. However,
it does not include policy monitoring or support for explicit access control, as access decisions are
handled by OPA using logic-based policies rather than static subject-permission mappings. Enforcement
decisions are delegated to OPA, which evaluates runtime access conditions. While it lacks built-in
compliance checking, the separation between specification and execution makes ODRL-PAP suitable
for modular, interoperable environments.
          </p>
          <p>
            The MOSAICrOWN Policy Engine [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ] is an ODRL-based access control module developed in the
context of privacy-preserving data analytics. It evaluates access requests using ODRL policies that
define constraints over actions, purposes, data subjects, and contextual attributes. The engine supports
complex rule hierarchies and expressive conditions such as attribute visibility and duty-based obligations.
However, it does not support runtime policy management or monitoring, and it lacks integration with
AC mechanisms. Its architecture is tailored to the needs of the MOSAICrOWN framework, and no
general-purpose API is provided. Despite these limitations, it shows how ODRL can be efectively
applied to control access in federated data pipelines.
          </p>
          <p>
            Interoperable Usage Control [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ] proposes a usage control framework based on ODRL for the context
of European Data Spaces. It introduces support for dynamic constraints—such as temporal, contextual,
or purpose-based conditions—making policy enforcement more adaptive. However, the framework does
not provide integration APIs or monitoring capabilities, and its implementation is primarily conceptual
at this stage.
          </p>
          <p>
            The OTT Copyright Management System [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ] extends ODRL for the automated governance of digital
content rights in Over-the-Top (OTT) platforms. It supports policy specification using the ODRL 2.2
vocabulary to represent copyright transactions, ownership ratios, and usage permissions. The system
includes automatic policy enforcement via smart contracts that verify agreement thresholds before
executing copyright transfers. It incorporates mechanisms for policy management such as agreement
recording and verification. While it does not integrate AC, it ensures secure control using digital
signatures and zero-knowledge proofs. Monitoring is achieved through immutable blockchain logs that
capture usage events and transactions. Although it does not expose a REST API, it ofers a functional
modular interface through Hyperledger Fabric components. It partially supports dynamic constraints
related to ownership and user signatures but does not include compliance checking mechanisms.
          </p>
          <p>
            ODRE [
            <xref ref-type="bibr" rid="ref22">22</xref>
            ] constitutes a significant contribution to ODRL-based enforcement by embedding a formal
execution model directly within the policy structure. It supports evaluation of permissions, obligations,
and access control, and allows compliance checking with contextual constraints. However, ODRE is
code-based and lacks a service architecture or REST API, which limits its usage in a decentralized
environment. In addition, it does not provide policy management capabilities such as creation, update,
or deletion of policies, nor does it support external monitoring or trust integration.
          </p>
          <p>
            The ODRE-PDS, proposed in this paper, builds upon ODRE and extends it with formal semantics [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ],
third-party trust models, and dynamic contextual evaluation. It is the first framework to integrate AC
enforcement, monitoring, and REST APIs within a fully extensible ODRL-based system. Similar to
OWL-POLAR [
            <xref ref-type="bibr" rid="ref24">24</xref>
            ], which provides reasoning capabilities for policy enforcement, ODRL extensions aim
to bridge semantic representation and runtime validation.
          </p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Framework A)</title>
          <p>
            ODRL Policy Modelling [
            <xref ref-type="bibr" rid="ref25">25</xref>
            ] ODRL
DUC [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ] ODRL Ontology
IntentKeeper [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ] ODRL Ontology
ODRL-PAP [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] ODRL (compiled to Rego)
MOSAICrOWN Policy Engine [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ] ODRL Ontology
Interoperable Usage Control [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ] ODRL+Ext. (Dyn. Constraints) 7
OTT Copyright Management System [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ] ODRL+Ext. (Copyright Terms) 3
ODRE [
            <xref ref-type="bibr" rid="ref22">22</xref>
            ] ODRL+Enf. Layer 7
ODRE-PDS (This work, 2025) ODRL+Ext. (Formal Semantics) 3
2.2. Summary
While previous eforts have contributed important mechanisms—such as compliance checking [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ],
REST APIs [
            <xref ref-type="bibr" rid="ref15 ref17">15, 17</xref>
            ], and enforcement logic [
            <xref ref-type="bibr" rid="ref22">22</xref>
            ]—none ofers a complete, extensible solution that supports
real-time enforcement, access control and monitoring. ODRE-PDS addresses this gap by providing a
structured API that supports dynamic policy enforcement and is designed for integration with external
trust mechanisms—although trust validation is not yet implemented in the current version. This
approach helps transform ODRL from a purely descriptive language into an operational framework for
privacy policy management.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed Approach</title>
      <p>This section presents the architecture of the ODRE Policy Directory Service (ODRE-PDS), a modular
and extensible Web service for managing, discovering, and enforcing policies defined using the Open
Digital Rights Language (ODRL). ODRE-PDS is designed to be deployed in decentralised environments
where external components, such as authentication services, monitoring systems, or biometric verifiers,
can interact and exploit its features.</p>
      <p>Figure 1 shows an overview of the ODRE-PDS architecture. The service consists of four main
components accessible through dedicated interfaces: the Management component, the Enforcement
component, the SPARQL component, and the Triplestore. These components are interconnected and
operate over the policies that are stored as a Knowledge Graph. All operations are available via a
RESTful interface, although the architecture can be easily adapted to support other transport protocols
besides HTTP.</p>
      <p>The Management component handles the lifecycle of ODRL policies, including their creation, update,
retrieval, and deletion. Policies that are registered must comply with the ODRL 2.2 specification,
as they are validated both syntactically—e.g., ensuring correct Turtle syntax—and semantically, by
verifying that all RDF terms conform to the expected structure defined by the ODRL ontology and that
policy elements follow the vocabulary constraints (such as valid use of permissions, constraints, and
actions) before being stored in the triple store. Policies can be submitted in RDF serialised as Turtle
or JSON-LD 1.1; internally policies are stored in the Triplestore component using named graphs, due
to this approach, each policy is stored individually, easing queries while maintaining provenance and
traceability. The SPARQL component allows to perform queries for discovering or exploring policies
stored in the ODRE-PDS (e.g., finding policies defined by a particular assigner or to target a specific
asset).</p>
      <p>Although it is not explicitly represented in the architectural diagram (Figure 1), the Evaluation
Engine plays a central role in the enforcement process. This logical component is responsible for
enforcing ODRL policies based on a state of the world that may include both internal and external
information relative to the ODRE-PDS. This separation allows the architecture to remain modular and
evaluation-agnostic, enabling the integration of alternative reasoning engines in future extensions.</p>
      <p>When a request is received through the Enforcement API, relevant policies are first retrieved from
the Knowledge Graph. In the envisioned architecture, policy relevance is determined by matching the
target resource, the requested action, and, where applicable, contextual parameters derived from the
state of the world. This allows the system to dynamically select only the applicable policies for a given
access request.</p>
      <p>Once the relevant policy is identified, contextual data—such as the current time, user identity, or
device location—is gathered and injected into the evaluation process. The Evaluation Engine then
assesses each rule defined in the policy individually, verifying whether its associated constraints—and,
where applicable, refinements—are satisfied given the current state of the world. A rule is considered
satisfied if all of its conditions hold. If one or more rules evaluate positively, the corresponding actions
specified in those rules are either taken or executed by the ODRE-PDS or those actions are delegated to
a third-party component or actor to be taken.</p>
      <p>A key feature of the ODRE-PDS Enforcement API is its ability to operate in access control and
monitoring scenarios. In the former, when a third party intends to take an action over a resource
protected by a policy, the enforcement of that policy is triggered. The evaluation of the policy is
performed based on a set of data from the state of the world that does not change during the enforcement
process, such as a allow list for accessing a resource. In this case, the enforcement task finishes after
the evaluation, and the action is taken (either by the system or by a third party entity). In the latter
scenario, the enforcement keeps evaluating the policy during the time window in which the third party
keeps intending the action.</p>
      <p>For example, let us assume that a document is protected by a policy. In an access control scenario,
the policy may allow reading the document if valid credentials are provided. During enforcement, the
credentials obtained from a third-party entity (i.e., the state of the world) are evaluated against those
specified in the policy. If they match, the policy is considered satisfied, and the document is delivered
as the result of the enforcement (i.e., the system executes the permitted action).</p>
      <p>In a monitoring scenario, the policy may allow the document to be displayed only if an AI model
detects a face associated with a unique identifier that is authorized to access it. In this case, enforcement
requires continuous evaluation of the state of the world, which may change over time. If the AI-provided
identifier no longer matches the one allowed in the policy, the system stops displaying the document.
Note that the policy only performs the odrl:display action but it is not able to control if a practitioner is
reading the document.</p>
      <p>The diferent aforementioned features make ODRE-PDS particularly suitable for decentralised
initiatives. On the one hand, it supports access control and monitoring scenarios, making ODRE-PDS
suitable for a wide range of use cases. On the other hand, the decentralised nature of linked data (RDF)
allow diferent ODRE-PDS instances to be deployed working in conjunction. For instance, the discovery
based on SPARQL could be federated over multiple directories relying on the SERVICE statement of the
SPARQL queries.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Implementation</title>
      <p>To showcase the feasibility of the proposed architecture of the ODRE-PDS service, a Python-based
implementation has been made publicly available in Git under an Apache 2.0 license2 . The implemented
service provides a RESTful interface built with FastAPI 3, allowing external applications to manage,
evaluate and enforce ODRL policies in real time. The transport protocol used is HTTP since it is a
W3C standard; however, the modular design allows future integrations with alternative communication
protocols, such as CoAP or MQTT.</p>
      <p>The Management and SPARQL components are developed using the rdflib 4 that handles diferent
serialisations of RDF. This library is used to translate policies from JSON-LD 1.1 to Turtle serialisation
or to perform SPARQL queries over a set of policies expressed in Turtle. Since the ODRL standard has
not yet published a JSON-LD 1.1 frame, having a policy in JSON-LD 1.1 which has to be translated to
Turtle and back to JSON-LD 1.1 obtaining the same identical policy as the original is complex and tricky;
requiring multiple potential ad-hoc adjustments. Due to this reason, the ODRE-PDS implementation
does not rely on a Triplestore but instead, this component stores directly the policies written in JSON-LD
1.1. Only when a SPARQL query is issued, the policies are translated to Turtle and the query performed.
In addition to not having the frame, this implementation choice is motivated by the fact that it is
expected to have more requests that need to retrieve policies rather than query requests; with this
implementation, response times are optimised in these cases.</p>
      <p>
        Finally, the Enforcement Evaluator is implemented based on the ODRE enforcement framework [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ],
in particular with the enforcement algorithm implemented in Python. This framework allows to enforce
a policy providing a state of the world modelled as a JSON set of values. The ODRE-PDS implementation
enhances the construction of the state of the world that can be used to enforce a policy by injecting
values provided in a request to the Enforcement API sent as parameters in the URL. Following this
approach, a policy can take into account the information that a requester may provide using URL
parameters.
      </p>
      <p>The implemented Enforcement API raises the question of trust in the values provided in the URL</p>
      <sec id="sec-4-1">
        <title>2https://github.com/ODRE-Framework/policy-directory-service 3https://fastapi.tiangolo.com/ 4https://rdflib.readthedocs.io/en/stable/</title>
        <p>parameters that could be used to enforce policies. It would be interesting to implement a mechanism to
trust who provides such values. For instance, a token-based system like JWT could be used so only
authorized and authenticated entities could provide information to be taken into account. However, due
to the academic nature of the current implementation, and the fact that the authors aim at providing a
proof of concept for the components described, this feature will be further analysed and implemented
in the future. This trust becomes particularly relevant and crucial in use cases like the one based on AI
explained in the following subsections that relies on biometric recognition.</p>
        <p>In order to facilitate its adoption and deployment in real-world scenarios, the ODRE-PDS
implementation has been containerised. This simplifies its integration into cloud-based or on-premises
infrastructures. In addition, all REST endpoints are documented with Swagger (Open API
specification 5) to ensure that developers can integrate ODRE-PDS with other services with minimal efort,
delegating policy-related decisions to the directory while maintaining their existing infrastructures.</p>
        <p>As a final remark, the ODRE-PDS implementation has been developed to support concurrent requests
through asynchronous processing, enabling horizontal scalability across distributed instances.
Stateless policy evaluation ensures low response times and high availability under load. As a result, the
implementation presented validates the operational feasibility of the proposed architecture, ofering a
suitable building block for decentralised initiatives.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Practical Use cases</title>
      <p>This section introduces two real-world use cases derived from research projects. The former use case
belongs to the AURORAL European project, where the ODRE-PDS was used to access certain documents
under certain temporal restrictions. The latter use case belongs to the GUIA project6, where ODRE-PDS
is used to allow the reading of confidential documents using biometric-based access. The usage of
ODRE-PDS in these projects validates its adoption in real scenarios.</p>
      <p>For the sake of privacy, the use cases described in the following subsections do not use the same
resources as those they protect in the projects. In addition, to showcase these use cases, public endpoints
have been enabled to see how they work. To this end, a public instance of the ODRE-PDS service has
been deployed 7. The Time-Restricted Access Policies use case can be accessed directly 8, whereas the
AI-Driven Access Control use case has been made available through a third-party service 9, which usage
is described in a video in the Zenodo repository10.
5.1. Time-Restricted Access Policies
This use case illustrates how ODRE-PDS protects the access to a specific document based on time,
ensuring that only requests within a valid time window are granted. The policy used in this scenario is
publicly available in the Zenodo repository under the file time base access policy.json.</p>
      <p>In this use case, a user attempts to access the European Union’s Artificial Intelligence Act document.
The access condition is defined using an ODRL policy where a constraint restricts the read action to
requests made before 23:59:00 to 00:00:00 considering the time zone of the server where the service is
deployed (CEST). Note that this restriction has been set for the sake of simplicity and reviewers’ demo.
The policy is expressed using RDF in JSON-LD format and stored in the directory, where it can be
retrieved and evaluated using the RESTful interface exposed by the system. The constraint is encoded
using the left operand time:time, a custom extension aligned with the ODRL ontology and published</p>
      <sec id="sec-5-1">
        <title>5https://swagger.io/specification/</title>
        <p>
          6See https://github.com/guia-project, Madrid Government Multiannual Agreement 2023-2026, Emerging PhD researchers,
M230020126A-AJCA
7https://odrldirectory.linkeddata.es/docs
8https://odrldirectory.linkeddata.es/api/policy/evaluate/5000
9https://aifacerecognition.linkeddata.es/
10https://doi.org/10.5281/zenodo.15106825
by Cimmino et al. [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], and the evaluation is performed using the current system time computed at
runtime.
        </p>
        <p>When a user wants to access the document, such user must make a request to the ODRE-PDS service,
in particular, a request to the Enforcement API. Then, the ODRE-PDS directory tries to find the relevant
policy for such request based on the policy identifier; if no policy is found, the directory provides an
empty response. Otherwise, the system updates its representation of the state of the world extracting
potential URL parameters and formatting them accordingly. In this case, the current time is taken from
the system and no parameters are extracted nor provided by the URL.</p>
        <p>The retrieved policy and the state of the world are then passed to the ODRE framework, which
evaluates the time constraint using its internal logic to process ODRL constraints. If the current time is
before the allowed limit, the condition is satisfied, and the ODRE framework proceeds to retrieve the
requested document from the storage layer (Document Store). The document is then returned to the
user, completing the access control flow. In case the condition is not satisfied, the system returns an
empty response with a denied access status.</p>
        <p>This aforementioned workflow is illustrated by Figure 2, which depicts the sequence of interactions
between the user, the ODRE-PDS, and the document store. The diagram outlines the enforcement flow,
showing how policy retrieval, evaluation, and document retrieval are orchestrated.
5.2. AI-Driven Access Control
This use case illustrates how ODRE-PDS protects the access to a specific document based on AI-driven
authentication mechanisms, such as facial recognition. This use case demonstrates how access to a
restricted document is granted only to users who have been authenticated via a pre-trained AI model.
By combining identity verification with policy enforcement, the system ensures that only authorised
individuals can retrieve and consume a specific document. The policy used in this use case and a
video showcasing it are publicly available in the Zenodo repository under the file named IA base access
policy.json.</p>
        <p>An external system named the AI Service operates by performing facial recognition and linking
its outputs to ODRL policies. When a user wants to read a document in the AI Service, this system
captures and processes their facial features, generating a unique Universally Unique Identifier (UUID).
The service then makes a request to the Enforcement API providing the UUID as a parameter in the
URL. The ODRE-PDS receives the request and tries to determine whether a relevant policy exists or not.
In the case it exists, the ODRE-PDS enforces the policy using ODRE and passing the UUID provided in
the request as part of the state of the world. In the case the enforcement is positive, the ODRE-PDS
provides to the AI Service the protected document. Take into consideration that the policy definition
explicitly links permitted UUIDs with access conditions, ensuring that only pre-registered individuals
can retrieve the document.</p>
        <p>Note that the AI Service performs continuous recognition and, therefore, the ODRE-PDS is
continuously enforcing the relevant policies. In the moment the AI Service stops providing a valid UUID
the ODRE-PDS stops providing the document. As a result, the AI service can no longer display the
document to the user. Note that revoking the document can only be achieved by stopping displaying
it and having mechanism in the AI service to prevent copying or leak anyhow the document. The
enforcement process of this use case follows the sequence diagram shown in Figure 3.</p>
        <p>The AI-driven access control provides several advantages over traditional access mechanisms. By
relying on facial recognition and ODRL policies, it eliminates the need for password-based
authentication, reducing the potential security risks associated with credential leakage. However, it entails a
technological challenge since it requires continuous enforcing of the relevant policies.</p>
        <p>As a final remark, this use case shows how the ODRE-PDS is an out of the box solution for many
complex scenarios. Since the policy enforcement logic is decoupled from the authentication mechanism,
organizations can integrate diferent AI-based verification services without modifying the enforcement
pipeline. This flexibility makes the ODRE-PDS well-suited for privacy-sensitive environments where
identity validation must be performed in compliance with strict regulatory standards.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Evaluation</title>
      <p>This section presents the evaluation performed for the ODRE-PDS implementation, which focuses on
analysing its eficiency and scalability. The evaluation has been carried out by performing the following
experiments: (i) policy enforcement performance, (ii) system scalability under concurrent requests, and
(iii) overhead introduced by ODRE-PDS in comparison to the ODRE framework. All experiments were
performed using the deployed ODRE-PDS and the pyodre11 implementation of ODRE.
6.1. Policy Enforcement Performance
To evaluate the eficiency of the Enforcement API, multiple access requests were executed using three
policies. The first policy, taken from the ODRL standard 12, encodes a restriction to access a resource
based on date and time, the second policy used is the one from the Time-Restricted Access Policies use
case, and the third policy is the one used in the AI-Driven Access Control use case; the second and third
policies can be found in the Zenodo repository.</p>
      <p>In this experiment, for each policy, 30 requests were made and their response times were recorded.
Then, all these values were averaged using the arithmetic mean. Figure 4 shows the results of the
experiment. It can be seen that the response time increases proportionally depending on how the
directory and the enforcement component evaluate them. While date-based policies are processed
quickly, the rest introduce additional latency. In any case, the results show that ODRE-PDS is able to
fulfil the requests in less than a second for the three policies.
6.2. Scalability and Concurrency Analysis
To evaluate the scalability of the Enforcement API in this experiment, concurrent requests to such API
are simulated using 10, 50, and 100 parallel requests and recording their response time. These requests
enforce the policy containing the date-time constraint.</p>
      <p>Figure 5 shows the results obtained in this experiment. It can be observed that the average latency
grows linearly with the number of concurrent requests. This behaviour, and the way it grows, indicates
that ODRE-PDS can be deployed in multi-user environments with increasing load, while maintaining
reasonable response times under stress.
6.3. Overhead Comparison with ODRE
To evaluate the overhead introduced by the REST-based infrastructure of ODRE-PDS, in this experiment,
the response times to enforce the same policy (with a simple date-time constraint) using the pyodre
engine and the Enforcement API of ODRE-PDS.</p>
      <p>In this experiment, the policy was enforced 30 times using both API and pyodre and the time they
required to finish recorded. Then, all these values were averaged using the arithmetic mean. Figure 6
shows the results of this experiment. It can be observed that ODRE-PDS introduces additional latency
(0.0617 s on average versus 0.0335 s pyodre), the overhead remains acceptable for real-time scenarios.
Most of the added latency comes from request processing and serialisation overhead.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>This article has presented the ODRE Policy Directory Service (ODRE-PDS), a novel Web-based
architecture designed to address current limitations of ODRL when adopted in practical scenarios or
decentralised initiatives. The ODRE-PDS provides three main features related to policies, namely:
management, discovery, and enforcement. Furthermore, the article presents an implementation of this
proposal coded in Python and publicly available.</p>
      <p>Beyond providing operational implementation, ODRE-PDS moves ODRL a step closer to being fully
usable in real-world systems, extending its scope from policy specification to practical enforcement,
real-time evaluation, and service integration. In this sense, ODRE-PDS transforms ODRL from a purely
descriptive language into a functional framework capable of supporting decentralised, privacy-aware
ecosystems. Its modular and flexible design makes it easier to plug into real-world systems, helping
bridge the gap between what is written in policies and what is actually enforced.</p>
      <p>In order to evaluate the ODRE-PDS implementation in terms of performance and scalability, the
article presents three experiments. The results advocate that the ODRE-PDS implementation is a
suitable out-of-the-box solution in real world scenarios. However, some limitations should be taken
into account, namely: the lack of trust mechanisms to verify the information provided by third-party
entities for policy enforcement, i.e., those provided via URL parameters. This limitation is especially
relevant in scenarios involving enforcement based on attributes provided by decentralised systems,
where malicious or unverified input may compromise the enforcement decision. In addition, the system
currently lacks built-in compliance logging mechanisms to support auditable traceability. Finally, The
current validation mechanisms and SPARQL interface could both be improved to align with more
characteristics of SPARQL 1.1. In the future, the authors aim to address the previous limitations. In
addition, the authors plan to explore the integration of ODRE-PDS into cross-domain infrastructures.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgements</title>
      <p>This work has been partially supported by: the Madrid Government (Comunidad de Madrid-Spain)
under the Multiannual Agreement 2023-2026 with UPM in Line A, Emerging PhD researchers through
the project GUIA (M230020126A-AJCA); the European Union’s Horizon 2020 Research and Innovation
Programme of the European Union through the AURORAL project (101016854); and the Next Generation
EU through the STICS project (09I02-03-V01).</p>
    </sec>
    <sec id="sec-9">
      <title>8. Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used ChatGPT, Grammarly in order to: Grammar
and spelling check, Paraphrase and reword. After using this tool/service, the author(s) reviewed and
edited the content as needed and take(s) full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I. D. S.</given-names>
            <surname>Association</surname>
          </string-name>
          , Technical Agreements, in: IDSA Rulebook,
          <year>2024</year>
          . URL: https://docs.internationaldataspaces.org/ids-knowledgebase/idsa-rulebook/idsa-rulebook/ 4_technical_agreements.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Rodríguez-Doncel, ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid</article-title>
          ,
          <source>in: IEEE European Symposium on Security and Privacy Workshops</source>
          ,
          <source>EuroS&amp;P</source>
          <year>2021</year>
          , Vienna, Austria, September 6-
          <issue>10</issue>
          ,
          <year>2021</year>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>298</fpage>
          -
          <lpage>306</lpage>
          . URL: https://doi.org/10.1109/EuroSPW54576.
          <year>2021</year>
          .
          <volume>00038</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Steyskal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polleres</surname>
          </string-name>
          ,
          <article-title>Defining expressive access policies for linked data using the ODRL ontology 2.0</article-title>
          , in: H.
          <string-name>
            <surname>Sack</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Filipowska</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Lehmann</surname>
          </string-name>
          , S. Hellmann (Eds.),
          <source>Proceedings of the 10th International Conference on Semantic Systems, SEMANTiCS</source>
          <year>2014</year>
          , Leipzig, Germany, September 4-
          <issue>5</issue>
          ,
          <year>2014</year>
          , ACM,
          <year>2014</year>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>23</lpage>
          . URL: https://doi.org/10.1145/2660517.2660530.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Maamar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Benna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kechaoui</surname>
          </string-name>
          ,
          <article-title>ODRL-Based Provisioning of Thing Artifacts for IoT Applications</article-title>
          , in: H.
          <string-name>
            <surname>Kaindl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Mannion</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          <string-name>
            <surname>Maciaszek</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the 19th International Conference on Evaluation of Novel</source>
          Approaches to Software Engineering,
          <string-name>
            <surname>ENASE</surname>
          </string-name>
          <year>2024</year>
          , Angers, France,
          <source>April 28-29</source>
          ,
          <year>2024</year>
          , SCITEPRESS,
          <year>2024</year>
          , pp.
          <fpage>168</fpage>
          -
          <lpage>178</lpage>
          . URL: https://doi.org/10.5220/0012718600003687.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cimmino</surname>
          </string-name>
          , Andrea and
          <string-name>
            <surname>Cano-Benito</surname>
          </string-name>
          ,
          <article-title>Juan and García Castro, The AURORAL Privacy Approach for Smart Communities Based on ODRL</article-title>
          ,
          <source>in: International Summit on the Global Internet of Things and Edge Computing</source>
          , Springer,
          <year>2024</year>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Golpayegani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <article-title>AIUP: an ODRL Profile for Expressing AI Use Policies to Support the EU AI Act</article-title>
          , in: D.
          <string-name>
            <surname>Garijo</surname>
            ,
            <given-names>A. L.</given-names>
          </string-name>
          <string-name>
            <surname>Gentile</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kurteva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Mannocci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Osborne</surname>
          </string-name>
          , S. Vahdati (Eds.),
          <source>Joint Proceedings of Posters, Demos, Workshops, and Tutorials of the 20th International Conference on Semantic Systems co-located with 20th International Conference on Semantic Systems (SEMANTiCS</source>
          <year>2024</year>
          ), Amsterdam, The Netherlands,
          <source>September 17-19</source>
          ,
          <year>2024</year>
          , volume
          <volume>3759</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3759</volume>
          /paper17.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Monegraph</surname>
            ,
            <given-names>Renato</given-names>
          </string-name>
          <string-name>
            <surname>Iannella</surname>
          </string-name>
          and Villata, Serena,
          <source>ODRL Information Model 2</source>
          .2, in: W3C Recommendation,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>Standard</surname>
          </string-name>
          ,
          <source>eXtensible Access Control Markup Language (XACML) Version</source>
          <volume>3</volume>
          .0,
          <string-name>
            <surname>A</surname>
          </string-name>
          :(
          <issue>22</issue>
          <year>January 2013</year>
          ). URl: http://docs. oasis-open.
          <source>org/xacml/3</source>
          .0/xacml-3.0
          <article-title>-core-spec-os-en</article-title>
          .
          <source>html</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcão</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hosseinzadeh</surname>
          </string-name>
          ,
          <article-title>Towards a Decentralized Data Privacy Protocol for Self-Sovereignty in the Digital World</article-title>
          , in: J.
          <string-name>
            <surname>Araújo</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. L. de la Vara</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Condori-Fernández</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Bruel</surname>
            ,
            <given-names>M. Y.</given-names>
          </string-name>
          <string-name>
            <surname>Santos</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Assar</surname>
            ,
            <given-names>K. D.</given-names>
          </string-name>
          <string-name>
            <surname>Moor</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Gharib</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          <string-name>
            <surname>Barros</surname>
            ,
            <given-names>I. S.</given-names>
          </string-name>
          <string-name>
            <surname>Brito</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Machado</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Karagiannis</surname>
            ,
            <given-names>T. P.</given-names>
          </string-name>
          <string-name>
            <surname>Sales</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          Salinesi (Eds.),
          <source>Joint Proceedings of RCIS 2024 Workshops and Research Projects Track colocated with the 18th International Conferecence on Research Challenges in Information Science (RCIS</source>
          <year>2024</year>
          ), Guimarães, Portugal, May
          <volume>14</volume>
          -17,
          <year>2024</year>
          , volume
          <volume>3674</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-3674
          <source>/ASPIRING-paper1.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Akaichi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <article-title>A comprehensive review of usage control frameworks</article-title>
          ,
          <source>Comput. Sci. Rev</source>
          .
          <volume>56</volume>
          (
          <year>2025</year>
          )
          <article-title>100698</article-title>
          . URL: https://doi.org/10.1016/j.cosrev.
          <year>2024</year>
          .
          <volume>100698</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Sandhu</surname>
          </string-name>
          ,
          <article-title>The UCONABC usage control model</article-title>
          ,
          <source>ACM Trans. Inf. Syst. Secur</source>
          .
          <volume>7</volume>
          (
          <year>2004</year>
          )
          <fpage>128</fpage>
          -
          <lpage>174</lpage>
          . URL: https://doi.org/10.1145/984334.984339.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Palmirani</surname>
          </string-name>
          , G. Governatori,
          <string-name>
            <given-names>T.</given-names>
            <surname>Athan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Boley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Paschke</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Wyner,
          <source>LegalRuleML Core Specification Version 1.0</source>
          ,
          <year>2021</year>
          . URL: https://docs.oasis-open.org/legalruleml/legalruleml-core-spec/
          <year>v1</year>
          .
          <article-title>0/os/legalruleml-core-spec-v1.0-os</article-title>
          .html, latest stage: https://docs.oasis-open.org/legalruleml/ legalruleml-core-spec/
          <year>v1</year>
          .
          <article-title>0/legalruleml-core-spec-v1.0</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cimmino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cano-Benito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>García-Castro</surname>
          </string-name>
          ,
          <article-title>Practical challenges of ODRL and potential courses of action</article-title>
          , in: Y.
          <string-name>
            <surname>Ding</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>J. F.</given-names>
          </string-name>
          <string-name>
            <surname>Sequeda</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Aroyo</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Castillo</surname>
          </string-name>
          , G. Houben (Eds.),
          <source>Companion Proceedings of the ACM Web Conference</source>
          <year>2023</year>
          ,
          <article-title>WWW 2023</article-title>
          , Austin, TX, USA, 30
          <source>April 2023 - 4 May</source>
          <year>2023</year>
          , ACM,
          <year>2023</year>
          , pp.
          <fpage>1428</fpage>
          -
          <lpage>1431</lpage>
          . URL: https://doi.org/10.1145/3543873.3587628.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>M. D. Vos</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Padget</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>Satoh, ODRL Policy Modelling and Compliance Checking</article-title>
          , in: P. Fodor,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , D. Roman (Eds.), Rules and Reasoning - Third International Joint Conference,
          <source>RuleML+RR</source>
          <year>2019</year>
          ,
          <article-title>Bolzano</article-title>
          , Italy,
          <source>September 16-19</source>
          ,
          <year>2019</year>
          , Proceedings, volume
          <volume>11784</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2019</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>51</lpage>
          . URL: https://doi.org/10.1007/ 978-3-
          <fpage>030</fpage>
          -31095-
          <issue>0</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Munoz-Arcentales</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>López-Pernas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pozo</surname>
          </string-name>
          , Álvaro Alonso,
          <string-name>
            <given-names>J.</given-names>
            <surname>Salvachúa</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Huecas,</surname>
          </string-name>
          <article-title>An Architecture for Providing Data Usage and Access Control in Data Sharing Ecosystems</article-title>
          ,
          <source>Procedia Computer Science</source>
          <volume>160</volume>
          (
          <year>2019</year>
          )
          <fpage>590</fpage>
          -
          <lpage>597</lpage>
          . URL: https://www.sciencedirect.com/science/article/pii/ S1877050919317429, the 10th
          <source>International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2019) / The 9th International Conference on Current and Future Trends of Information</source>
          and
          <article-title>Communication Technologies in Healthcare (ICTH-</article-title>
          <year>2019</year>
          ) / Afiliated Workshops.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Munoz-Arcentales</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>López-Pernas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pozo</surname>
          </string-name>
          , Á. Alonso,
          <string-name>
            <given-names>J.</given-names>
            <surname>Salvachúa</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Huecas, Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE</article-title>
          .
          <source>Sustainability</source>
          <volume>12</volume>
          ,
          <issue>9</issue>
          (
          <year>2020</year>
          ),
          <fpage>38</fpage>
          -
          <lpage>85</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cirillo</surname>
          </string-name>
          , B. Cheng, R. Porcellana,
          <string-name>
            <given-names>M.</given-names>
            <surname>Russo</surname>
          </string-name>
          , G. Solmaz,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sakamoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Romano</surname>
          </string-name>
          ,
          <article-title>IntentKeeper: Intent-oriented Data Usage Control for Federated Data Analytics</article-title>
          ,
          <source>in: 2020 IEEE 45th Conference on Local Computer Networks (LCN)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>204</fpage>
          -
          <lpage>215</lpage>
          . doi:
          <volume>10</volume>
          .1109/LCN48667.
          <year>2020</year>
          .
          <volume>9314823</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wiesner</surname>
          </string-name>
          , ODRL-PAP:
          <article-title>Policy Administration Point to handle ODRL policies</article-title>
          , https://github.com/ wistefan/odrl-pap,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>A. O'Mahony</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Barnett</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Globin</surname>
          </string-name>
          ,
          <article-title>Using automotive property graph-based data models in a knowledge graph, 2021</article-title>
          . URL: https://api.semanticscholar.org/CorpusID:250165724.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>I.</given-names>
            <surname>Akaichi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Slabbinck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Rojas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. V.</given-names>
            <surname>Gheluwe</surname>
          </string-name>
          , G. Bozzi,
          <string-name>
            <given-names>P.</given-names>
            <surname>Colpaert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Verborgh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <article-title>Interoperable and Continuous Usage Control Enforcement in Dataspaces</article-title>
          , in: J.
          <string-name>
            <surname>Theissen-Lipp</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Colpaert</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <string-name>
            <surname>Sowe</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Curry</surname>
          </string-name>
          , S. Decker (Eds.),
          <source>Proceedings of the Second International Workshop on Semantics in Dataspaces (SDS</source>
          <year>2024</year>
          )
          <article-title>co-located with the 21st Extended Semantic Web Conference (ESWC</article-title>
          <year>2024</year>
          ), Hersonissos, Greece, May
          <volume>26</volume>
          ,
          <year>2024</year>
          , volume
          <volume>3705</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3705</volume>
          /paper10.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W.</given-names>
            <surname>Son</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kwon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Oh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <source>Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language, Electronics</source>
          <volume>13</volume>
          (
          <year>2024</year>
          ). URL: https: //www.mdpi.com/2079-9292/13/2/336.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Andrea</given-names>
            <surname>Cimmino</surname>
          </string-name>
          and
          <article-title>Juan Cano-Benito and Raúl García-Castro, Open Digital Rights Enforcement framework (ODRE): From descriptive to enforceable policies</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>150</volume>
          (
          <year>2025</year>
          )
          <article-title>104282</article-title>
          . doi:https://doi.org/10.1016/j.cose.
          <year>2024</year>
          .
          <volume>104282</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>N.</given-names>
            <surname>Fornara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rodríguez-Doncel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Steyskal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. W.</given-names>
            <surname>Smith</surname>
          </string-name>
          , ODRL Formal Semantics,
          <source>Draft Community Group Report</source>
          ,
          <year>2025</year>
          . URL: https://w3c.github.io/odrl/formal-semantics/.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sensoy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Norman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. W.</given-names>
            <surname>Vasconcelos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Sycara</surname>
          </string-name>
          ,
          <article-title>OWL-POLAR: A framework for semantic policy representation and reasoning</article-title>
          ,
          <source>J. Web Semant</source>
          .
          <volume>12</volume>
          (
          <year>2012</year>
          )
          <fpage>148</fpage>
          -
          <lpage>160</lpage>
          . URL: https: //doi.org/10.1016/j.websem.
          <year>2011</year>
          .
          <volume>11</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>M. D. Vos</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Padget</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Satoh</surname>
          </string-name>
          ,
          <article-title>ODRL policy modelling and compliance checking</article-title>
          , in: P. Fodor,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , D. Roman (Eds.), Rules and Reasoning - Third International Joint Conference,
          <source>RuleML+RR</source>
          <year>2019</year>
          ,
          <article-title>Bolzano</article-title>
          , Italy,
          <source>September 16-19</source>
          ,
          <year>2019</year>
          , Proceedings, volume
          <volume>11784</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2019</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>51</lpage>
          . URL: https://doi.org/10.1007/ 978-3-
          <fpage>030</fpage>
          -31095-
          <issue>0</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>