<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Composing complex licenses to facilitate contextual resources reuse</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Manoé Kiefer</string-name>
          <email>manoe.kiefer@univ-nantes.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patricia Serrano-Alvarado</string-name>
          <email>patricia.serrano-alvarado@univ-nantes.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Margo Bernelin</string-name>
          <email>margo.bernelin@univ-nantes.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CNRS, Nantes Université</institution>
          ,
          <addr-line>DCS, UMR 6297, F-44000 Nantes</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Nantes Université, École Centrale Nantes</institution>
          ,
          <addr-line>CNRS, LS2N, UMR 6004, F-44000 Nantes</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The ever-growing number of accessible online resources allows any person to modify, to derive, to combine resources in order to create and share new resources. Overseeing those interactions are licenses that define if and how each resource can be reused. As the author can choose to protect and share the new resource to any extent, the license used can be more or less complex and specific. In particular, contextual constraints in a license can circumscribe the reusability of its covered resource to a specific context such as a given location, during a given timeframe, or in specific media. In addition, the new resource must be protected by a license that complies to the licenses of its source materials, it should also be the least restrictive possible in order to make it as shareable as the author wishes. This makes finding a license which complies to a set of potentially complex licenses a challenging task for an author without legal knowledge. We propose CLiC, an approach that, while taking into account contextual constraints expressed in ODRL, composes the least restrictive license that complies to a given set of potentially complex licenses. The idea is to help authors in reusing resources protected by complex licenses while maximizing the shareability of new resources. This way an author obtains the adequate license for a new resource that complies to the licenses of its source materials, while limiting as little as possible its shareability.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Complex licenses</kwd>
        <kwd>ODRL</kwd>
        <kwd>License constraints</kwd>
        <kwd>licenses compatibility</kwd>
        <kwd>licenses composition</kwd>
        <kwd>license restrictiveness</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The amount of available online resources motivates authors to take inspiration from, to modify, to
derive, and to compose existing resources into new ones. In that context, attaching a license to a new
resource is fundamental to control and facilitate reusability. A license specifies how a resource can
and cannot be used, i.e., what actions are permitted, obligated and prohibited. The most well-known
licenses used with online resources are simple licenses designed to foster an easier reuse of resources.
Their simplicity comes from the use of general and clearly defined clauses, allowing the licenses to be
applicable in numerous contexts. Examples of such licenses include the Creative Commons’ licenses1
for creative works, or the MIT2 and Apache3 licenses for source code.</p>
      <p>However, some cases require resources to be protected by more specific or complex licenses that
include contextual constraints. Therefore, in addition to the well-known licenses, a number of other
licenses can exist. They, then, vary in terms of their complexity, scope of application, or drafting
languages. Online stock image resources, coming from companies such as Shutterstock or Adobe,
are an example of resources protected by complex dedicated licenses that describe specific contextual
constraints45. Those constraints limit a resource’s reuse to a given context, e.g., a circumscribed timeline,
a particular country, specific purpose, a certain number of reuse. Contextual constraints can also include</p>
      <p>© 2025 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
specific information such as the legal jurisdiction the licenses must comply with or the court where
a case will need to be brought if legal actions were to take place in relation to the covered resource.
Contractual by nature, these legal documents should not be overlooked by the resources’ users as legal
consequences are attached to their infringement both under contract law and intellectual property law.</p>
      <p>
        When combining multiple source materials into a new resource, an author is tasked with finding a
license that will protect the new resource and be compliant with the sources’ first licenses. The re-user
will have the daunting task to delve into the legal analyses of multiple licenses, perhaps in diferent
languages, in order to pick a license that will accommodate the first ones. Indeed, the overall license
should, at most, have the same permissions (or a coherent intersection of them), and at least the same
obligations and prohibitions than the licenses of the source materials [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Those combining principles
will also mean that the overall license should be restrictive enough to comply with the licenses of the
source materials. Thus, the chosen license should be compliant with the licenses of the source materials,
while the latter should be compatible with the chosen license.
      </p>
      <p>Following the idea of maximizing shareability, the author should also pay attention that his/her
license for his/her new resource is not too restrictive as it reduces its reusability. This additional
constraint will, again, require the author to legally analyse closely licenses options. If the author does
not find a suitable license, he/she will be left to draft his/her own licensing terms. In other words, the
author will often be required to draft from scratch a contractual document, the license, that will be
legally compliant with the initial licenses covering the source materials. In that scenario, the author will
have to compose a new license by combining terms from the original ones without introducing errors
or loopholes. This will require the author to have a good legal understanding of the first licenses and
the ability to translate his/her analysis into another contractual document. From a legal point of view,
any mistake will bare serious and actual contractual consequences. Such legal analysis and drafting are
often left to Contract or Intellectual Property lawyers when companies need a license, but for a lay
individual author, seeking legal advice and writing will not be an option.</p>
      <p>Tools could (semi-)automatically do this task. To understand licenses, a tool needs to have the licenses
in a machine-readable language. ccREL6 is the language used by Creative Commons to represent their
licenses. L4LOD7 is a similar lightweight language. MPEG-218 is an ISO standard that permits the
expression of licenses. ODRL9 is a W3C standard made to represent complex types of policies. In
this work we rely on the ODRL vocabulary for its capacity to express complex contextual constraints
thanks to constraints and refinements. The ODRL vocabulary provides concepts that convey basic legal
provision such as permission, duty and prohibition. The vocabulary targets the usage of content or
services. A license can be considered as an ODRL Ofer, an ofer is composed of a list of rules and of an
assigner, here it is the person licensing the resource. A rule is an abstract representation of a permission,
a duty, or a prohibition, which we call status in this work. Each rule concerns one action in a status. As
stated, ODRL allows expressing licenses with complex contexts thanks to constraints and refinements .
An ODRL constraint allows to restrict a given rule to a specified context. While an ODRL refinement
allows to further precise an action in a rule.</p>
      <p>Figure 1 shows a graphical representation of three licenses (see in Appendix A their ODRL expression).
L1 contains three rules (A, B, and C). Rule A permits the distribution of the target with a constraint
(dateTime &gt; 2030) and a refinement of the action Distribution (mediaType on TV and online streaming).
Rule B obliges a compensation (payAmount of 1000$). And Rule C prohibits Commercial Use until 2050
in Europe. After 2050, this rule is not applicable and the user has to refer to standard copyright rules.
L2 contains also three rules (D, E and F). Roughly speaking, with L2 the target can be distributed until
2050 on TV, online streaming, and movies (rule D). It can also be distributed without time constraint on
printed medias as journals and books (rule E). But L2 has a prohibition of distribution on TV before
2040 (rule F).</p>
      <p>The license that would protect a new resource combining resources protected by L1 and L2 should</p>
      <p>L1</p>
      <p>L2
L3 = L1 • L2</p>
      <p>Permits
Obliges
Prohibits</p>
      <p>Distribution
Compensate
Commercial</p>
      <p>Use
Permits</p>
      <p>Distribution
Prohibits</p>
      <p>Distribution
Permits</p>
      <p>Distribution
Obliges
Prohibits</p>
      <p>Compensate
Commercial</p>
      <p>Use
Prohibits</p>
      <p>Distribution</p>
      <p>dateTime &gt; 2030
mediaType ∈ {TV, online streaming}
payAmount = 1000$
dateTime ≤ 2050
spatial ⊆ Europe
dateTime ≤ 2050
mediaType ∈ {TV, online streaming, movies}</p>
      <p>License</p>
      <p>Rule
status
action
constraint
refinement
mediaType ∈ {journals, books}</p>
      <p>dateTime ≤ 2040
mediaType ∈ {TV}</p>
      <p>2030 &lt; dateTime ≤ 2050
mediaType ∈ {online streaming}</p>
      <p>2040 &lt; dateTime ≤ 2050
mediaType ∈ {TV}
payAmount = 1000$
dateTime ≤ 2050
spatial ⊆ Europe
dateTime ≤ 2040
mediaType: ∈ {TV}
(1) contain every prohibition and duty of L1 and L2 (i.e., the prohibitions and duties of L1 and L2 are
propagated), and (2) contain the intersection of the permissions of L1 and L2 that are not in contradiction
with the propagated prohibitions and duties. If such a license exists, it must be equally or more restrictive
than both L1 and L2. In our example, neither L1 nor L2 can be this license. We cannot determine which
one is more restrictive because neither fully encompasses the other. Neither contains at least the same
prohibitions and obligations as the other, nor does either include at most the same permissions as the
other.</p>
      <p>We argue that L3 in Figure 1 meets requirements (1) and (2). L3 is the least restrictive license that
complies to L1 and L2 because, on the one hand, it includes all the prohibitions and duties propagated by
L1 and L2 (and no more) with the minimal constraints and refinements necessary to ensure compliance
with both licenses. On the other hand, it retains as many permissions as possible without contradicting
the propagated prohibitions and obligations, while keeping constraints and refinements to a minimum.
Concretely, L3 includes every duty and prohibition described by L1 and L2. It does not contain the
permission E of L2, as there is no permission in L1 which intersects with the constraint and refinement
of E. Finally, L3 contains the permissions A of L1 and D of L2 as the permissions A•D’ and A•D". These
two rules contain the intersection of the constraints and refinements of A and D, except what is stated
as prohibited by F. Other licenses that would comply to L1 and L2 are licenses that are compliant
with L3, but with additional constraints and refinements over the permissions than L3, and with more
obligations and duties. This license would be more restrictive than L3. Indeed, following this idea, a lot
of more restrictive licenses compliant to L1 and L2 may exist.</p>
      <p>
        Obtaining L3 automatically is challenging and still an open problem [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], especially with complex
licenses that contain constraints and refinements. If multiple works already tackle the challenge of
license composition [
        <xref ref-type="bibr" rid="ref1 ref3 ref4 ref5 ref6">1, 3, 4, 5, 6</xref>
        ], not all can support contextual constraints [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3, 4, 5, 6</xref>
        ], and none of
them fully supports them as described with ODRL constraints and refinements.
      </p>
      <p>Thus, our problem statement is how to automatically build a license that complies with a set of complex
licenses containing constraints and refinements? The challenge is to guarantee that such a license is the
least restrictive license equally or more restrictive than the complex licenses it complies to. In this paper
we propose CLiC (Complex License Composition), an approach to build a license by composing a set of
complex licenses. The main idea of our approach is to order constraints and refinements based on their
restrictiveness using a set-based comparison. This approach guarantees that the resulting license is the
least restrictive license that can be used to cover a resource combining source materials protected by
diferent complex licenses. A implementation of CLiC is available on Git 10.</p>
      <p>The rest of the paper is structured as follows. We present existing works in license composition
in Section 2. We formally define CLiC in Section 3. We present two use cases in Section 4, one with
Creative Commons licenses, and one with the complex licenses of Figure 1. Then we discuss about the
limitation and future works surrounding CLiC in Section 5. Finally, Section 6 concludes the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        CLiC is an approach to license composition that builds upon but also goes beyond existing work. For
instance the study by Gangadharan et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] is an approach specifically tailored for licenses in the
context of services. It leverages a matchmaking algorithm to analyze the compatibility and enable the
composition of service licenses. Gangadharan et al. utilize an extension of ODRL for services named
ODRL/L(S) that they defined in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This language contains elements of contextual constraints, such as
the financial model of a service, or its warranties, indemnities, and limitation of liabilities. Despite that,
ODRL/L(S) does not leverage the constraints and refinements present in the base language. Therefore,
it cannot compose licenses with contextual constraints and refinements as described in ODRL.
      </p>
      <p>
        The work by Mesiti et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is an approach made to help composing resources and to generate a
license expressing the rights in the reuse for the resulting resource. It represents licenses using MPEG-21
as only a list of grants with conditions. This can be understood as licenses containing permissions with
constraints. This approach does not consider prohibitions, duties, or refinements. The use of conditions
allows Mesiti et al. to represent complex licenses by precising, for instance, time or spatial constraints.
In addition, their approach can check whether a specific user’s profile violates a license’s conditions.
But the representation of a license as a list of grants limits this work to licenses only composed of
permissions, and conditions only allow the representation of constraints, not refinements.
      </p>
      <p>
        The paper by Governatori et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] uses deontic logic and defeasible logic to represent licenses and
compose them into a new compliant license. The method does not allow the expression of contextual
constraints and refinements as described with ODRL. Furthermore, when composing a new license
from a set, this approach adds all prohibitions and duties from the set of licenses to the new license,
potentially composing a license that contradicts itself and producing an invalid license.
      </p>
      <p>
        DALICC [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is a software framework that helps users in the reutilization of resources. DALICC
allows for the user to search existing licenses, to create and check the coherency of new licenses, and to
evaluate their equivalence or compatibility in regards to a library of well-known licenses. The framework
uses answer set programming to detect potential conflicts between licenses. Status and actions are
represented by DALICC as a knowledge graph that links together actions using their semantic relations.
As shown in the current iteration of the tool11, DALICC allows the creation of new licenses with the
specification of temporal and spatial constraints. But, to the best of our knowledge, DALICC does not
incorporate contextual constraints exhaustively, only singular examples. In addition, DALICC does not
allow for the automated composition of multiple licenses in order to find or generate a new license that
ifts the users’ situation. Therefore, DALICC cannot express or compose complex licenses such as the
ones considered in this work.
      </p>
      <p>
        The model CaLi proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] relies on the concept of restrictiveness. The model partially orders
licenses on a lattice of restrictiveness, and using that lattice, define a compatibility relation between
licenses. Despite the fact that the paper [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] does not explicitly specify it, the formalization of a lattice
10https://gitlab.univ-nantes.fr/clara/clic
11https://www.dalicc.net/license-composer/
of licenses allows for the composition of any pair of license thanks to the join operation12. But the
model CaLi does not incorporate contextual constraints, in particular, it cannot trivially be extended to
support ODRL refinements. This is due to the fact that CaLi restricts licenses to having only a single
rule on a given action, while ODRL refinements foster the use of the same action multiple times with
diferent refinements in the same license.
      </p>
      <p>
        In conclusion, none of the existing works on license composition can compose the license L3 of our
motivating use case. That is why we propose CLiC. As most of the approaches described in this section
[
        <xref ref-type="bibr" rid="ref1 ref3 ref4 ref6">1, 3, 4, 6</xref>
        ], CLiC describes a license as a set of three types of rules, permission, duties, and prohibitions.
As opposed to the studied methods, we leverage contextual constraints and refinements based on ODRL.
Our approach proposes a composition of licenses based on the comparison of contextual constraints in
terms of domains, i.e., we express constraints and refinements as domains of values. This representation
as domain allows CLiC to incorporate any type of contextual constraint that could be represented as
a domain. Our comparison is achieved inspired by the notion of restrictiveness as described in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
The idea is that, given two licenses, one is considered compliant with the other if it is equally or more
restrictive than the latter.
3. CLiC: composing complex licenses with constraints and
refinements
In this work we propose CLiC (Complex License Composition), a method to compose a set of complex
licenses in order to build the least restrictive license compliant to that set. To achieve this, we base
our approach on the notion of restrictiveness describe in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. As every rule in a complex license can
contain multiple constraints and refinements, we compare constraints and refinements in terms of
restrictiveness. For that, the main idea we propose is to consider constraints and refinements as sets of
values, i.e., as domains. As a basic principle, we consider that a permission with a constraint is more
restrictive than a permission without constraints, because a constraint restricts the permission to a
specific context. On the contrary, a duty or an obligation with a constraint is less restrictive than a duty
or obligation without constraints, because a constraint reduces the restrictiveness of the duty or the
obligation to a specific context. This idea is analogous for the refinement of actions. Based on that
principle and the hypothesis that constraints and refinements define domains, we can compare them
based on the inclusion of those domains.
      </p>
      <p>A complex license is a set of rules. Each rule concerns a status, a specific action, a collection of
constraints, and a collection of refinements. Composing two complex licenses therefore devolves into
comparing the rules of the original licenses to find the least restrictive set of rules that composes the
new license, with the right constraints and refinements. If a new license can be composed from a set of
source licenses, our set-based approach for comparing domains assures that the new license integrates
every prohibition and duty contained in the source licenses, and that it contains as much permissions
as possible, leading to the least restrictive license compliant to an original set of licenses.</p>
      <p>In this section we describe CLiC, our approach to compose a set of licenses into a new license. Section
3.1 introduces the formal definitions that allow to compare constraints and refinements in the context
of a status and an action. Section 3.2 introduces the algorithm that, based on these definitions, allows to
obtain the least restrictive license that is compliant to the licenses it composes.
3.1. Formal comparison of constraints and refinements based on their restrictiveness
To compare the rules of diferent licenses, we need to be able to compare the constraints and refinements
of diferent rules based on restrictiveness. This section introduces three definitions. Definition 1 formally
defines the restrictiveness order over collections of constraints while Definition 2 formally defines
the restrictiveness order over collections of refinements. With these definitions we can finally define
complex licenses in Definition 3.
12https://en.wikipedia.org/wiki/Join_and_meet</p>
      <p>In the following, we formalize a constraint and a collection of constraints as a set of constraints
of distinct types, e.g., a temporal constraint and a spatial constraint. Limiting collections to have
constraints of distinct types allows for an easier comparison of two collections. In addition, it does not
reduce the variety of licenses that can be expressed, because two constraints of a same type can be
expressed as a single constraint by utilizing the intersection of their domains, e.g., the two constraints
(dateTime &lt; 2050) and (dateTime ≥
2030) can be joined as (2030 ≤
dateTime &lt; 2050).</p>
      <p>After defining collections of constraints, we also formalize the restrictiveness relation between
collections in the context of a status.</p>
      <sec id="sec-2-1">
        <title>Definition 1 (Restrictiveness order over collections of constraints).</title>
        <p>Constraint. We define a constraint  in the context of a given status as a pair (︀ , )︀ where the
corresponds to a combination of the Operator and rigthOperand.
ifrst element is the type of the constraint and the second element is the domain of the constraint. We name
 the set of all possible constraints in the status . In ODRL,  corresponds to leftOperand and</p>
      </sec>
      <sec id="sec-2-2">
        <title>Collection of constraints.</title>
        <p>We define a collection of constraints  as a set of constraints, each with a
diferent type. We name  the list of types present in a collection of constraints. We formally define all
the possible collections of constraints  as a subset of the powerset of , ℘ (), given a status :
 = { ∈
℘ () |∀,  ∈ , 
 = 
 =⇒  =  }
Restrictiveness relation over the set of constraints . We consider that, (i) for the status Prohibition
and Duty, given two constraints , 
context of a same status,  ≤   , if 
 ≤   if 

 = 


∧ 


⊇
∈</p>
        <p>, the former constraint is less restrictive than the latter in the
 = 


∧ 
⊆

. And (ii) for the status Permission,

. For instance, this allows to establish a restrictiveness
relation for the constraints of C and F in Figure 1 as (dateTime ≤ 2040) ≤  ℎ (dateTime ≤ 2050).
Restrictiveness relation over the set of collections . From that relation over constraints, we define
a restrictiveness relation ≤  over  by comparing pairwise the domains of the constraints that have the
same type in the context of the same status . The intuition is that for every status, the collection whose
constraints are always equally or less restrictive than the constraints of another collection is equally or less
restrictive than that other collection.</p>
        <p>For  ∈ {,  ℎ}:
∀,  ∈ ,  ≤   ⇐⇒ 
⊆</p>
        <p>∧ (∀ ∈ , ∃ ∈  , such that  ≤   )
For  ∈ { }:
∀,  ∈ ,  ≤   ⇐⇒ 
⊇ 
∧ (∀ ∈  , ∃ ∈ , such that  ≤   )
(1)
(2)
(3)</p>
        <p>For practicality, we also redefine two set operators over collections of constraints: the intersection,
and the subtraction. The operators are defined using the equality of the type of the constraints from
two collections, and the intersection or subtraction of the constraints’ domains. The intersection, noted
as ∩, is the intersections of all the constraints in two collections, defined as follows: for
 ∩  = { ∈ |∃ ∈ , ∃ ∈  ,
︁(
 = 
 = 

 = 
,  ∈ ,
∩ ︁)
}
.</p>
        <p>And the subtraction, noted as − , is a collection where the domains of its constraints have been subtracted
by the domains of the constraints of another collection. It is obtained by performing the following operation:
for two collections of constraints ,  ∈ , for every constraint  ∈ , if there exists a constraint

, 
∖ ︁) is one of the constraints of  −  ,
 ∈  with the same type as , then (︁ 

otherwise,  is one of the constraints of  −  .</p>
        <p>An example of a constraint is (dateTime, {| &gt; 2050}), it limits the dates on which a rule is applied
to every dates that comes after the year 2025. And an example of a collection of two constraints is
{(dateTime, {| &gt; 2050}) , (spatial, {| ⊆
limits the place targeted by the rule to be within Europe.</p>
        <p>Europe})}, in addition of the previous constraint, it</p>
        <p>We define a refinement, a collection of refinements, and the restrictiveness relation between collections
of refinements in the same way. The diference between constraints and refinements is that a constraint
is defined in the context of a status, while a refinement is defined in the context of a status and of an
action. That is because a refinement redefines an action to a more specific application.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Definition 2 (Restrictiveness order over collections of refinements).</title>
      </sec>
      <sec id="sec-2-4">
        <title>Refinement.</title>
        <p>We define a refinement</p>
        <p>in the context of a given status and of a specific action as a pair
︀( , )︀ where the first element is the type of the refinement and the second element denotes the
domain of the refinement. We name</p>
        <p>ℛ, the set of all possible refinements for the status  and action .</p>
      </sec>
      <sec id="sec-2-5">
        <title>Collection of refinements.</title>
        <p>We define a collection of refinements
 as a set of refinements, each with
a diferent type. We name  the list of types present in a collection of refinements . We formally
define all the possible collection of refinements for a given status
 and a given action  as ℰ, :
ℰ, = { ∈ ℘ (ℛ,) |∀,  ∈ , 
 = 
 =⇒  =  }

Restrictiveness relation over the set of refinements
ℛ,. As with constraints we define the
restrictiveness relation between two refinements. On a given action, for the status Prohibition and Duty, for

status Permission,  ≤ ,  if 
 = 


∧</p>
        <p>⊇

two refinements ,  ∈ ℛ,, then  ≤ ,  if 
 = 


∧  ⊆</p>
        <p>. For instance, this allows us to

. And for the

establish a restrictiveness order for the refinements of D and A in Figure 1 by saying that (   ∈

{ , , }) ≤  , (  ∈ { , }).
Restrictiveness relation over the set of collections ℰ,. From that relation over refinements, we
deifne a restrictiveness relation order ≤ , over ℰ, by comparing pairwise the domains of the refinements
that have the same type in the context of the same status  and action . The intuition is that for every
status paired with an action, a first collection where the refinements are always equally or less restrictive
than the refinements of a second collection is then equally or less restrictive than that second collection.</p>
        <p>For  ∈ {,  ℎ}:
For  ∈ { }:
∀,  ∈ ℰ,,  ≤ ,  ⇐⇒ 
⊆  ∧ ︀( ∀ ∈ , ∃ ∈  ,  ≤ ,

 )︀
(4)
(5)
(6)
∀,  ∈ ℰ,,  ≤ ,  ⇐⇒ 
⊇  ∧ ︀( ∀ ∈  , ∃ ∈ ,  ≤ ,

 )︀</p>
        <p>Additionally, in the same way as for two collections of constraints, we define the intersection of two
ℛ,|∃ ∈ , ∃ ∈  , (︁
 = 

 = 

collection of refinements. The intersection is defined as follows: for
 =</p>
        <p>∩ ︁)
,  ∈
ℰ,,  ∩  = { ∈
}. The subtraction,
noted − , is obtained by performing the following operation: for two collections of refinements ,  ∈ ℰ,,
for every refinement  ∈ , if there exists a refinement  ∈  with the same type as , then
︁(


,</p>
        <p>∖ ︁) is a refinement of  −  , otherwise,  is a refinement of  −  .
to only concern distribution on TV and in American English.</p>
        <p>An example of a refinement on the action distribute is (mediaType, {TV}), which redefines the
action to only concern distribution on television. And an example of a collection of refinements on
the same action would be {((mediaType, {TV}) , (language, {en-US})}, which redefines the action</p>
        <p>With the definition of a collection of constraints and a collection of refinements, it is possible to
define a complex licenses as a set of rules. Each rule contains a status and an action, and that rule can
be limited by a collection of constraints and a collection of refinements.</p>
      </sec>
      <sec id="sec-2-6">
        <title>Definition 3 (Complex license).</title>
        <p>Rule. Let  be a set of status,  be a set of actions,  be a set of collections of constraints for a status ,
and ℰ, be a set of collections of refinements for a status  and an action . A rule is a tuple (, , , )
defined on  ×  ×   × ℰ ,. The collections of constraints and refinements should be understood as
a conjunction. That means that all the constraints and refinements present in a rule need to be satisfied,
otherwise the rule cannot be exercised. For a rule  (, , , ), we name respectively ., ., ., and
. each of its element.</p>
        <p>Complex license. A license  is a set of rules, each defined on  ×  ×   × ℰ ,. Note that ∅ ∈ 
and ∅ ∈ ℰ,, meaning that it is possible for a rule in a complex license to have no refinements and no
constraints. We denote by  the set of rules assigned to the action  with the status  in the license , e.g.,
 is the list of rules in the license  relating to the status   and to the action .</p>
        <p>For example, the license L1 given in Figure 1 can be expressed as follows:
1 : { (Permission, Distribution, {(dateTime, {| &gt; 2030})}, {(mediaType, {TV, online streaming})}) ,
(Duty, Compensate, ∅, {(payAmount, {1000$})}) ,
(Prohibition, Commercial Use, {(dateTime, {| ≤ 2050}) , (spatial, {| ⊆ Europe})}, ∅) }
3.2. An algorithm to compose complex licenses
With the ability to compare constraints and refinements in the context of a status and an action, it is
possible to compare the rules of a set of complex licenses. By comparing and composing the rules of
two complex licenses, we can obtain the least restrictive license that is compliant to that pair. For that,
we propose the Algorithm 1.</p>
        <p>Algorithm 1 describes the function compose which, from two complex licenses  and  , returns the
least restrictive license compliant to  and  or an empty set if it is not possible. To achieve that we
perform four steps for every action present in  or  . We have as hypothesis that the licenses  and 
are correct and do not contain any rule preventing re-licensing (e.g., the obligation Share Alike, or the
prohibition of Derivative Works).</p>
        <p>Step 1. Propagation of Duties and Prohibitions. Line 5 adds every prohibition and duty defined
for a specific action in  or  to the resulting license. This guarantees that the resulting license will be
compliant to  and  in regards to the prohibitions and duties. Additionally, as we keep the constraints
and refinements within the prohibitions and duties, we ensure that the resulting license is as not
restrictive as possible. Lines 6 to 10 remove from the resulting license every unnecessary prohibition or
duty. That is, every prohibition or duty whose constraints and refinements are equally or less restrictive
than another prohibition or duty (cf. Definition 1 and 2). This efectively simplifies the resulting license
by removing rules that are contained in another rule.</p>
        <p>Step 2. Detection of incompatible Duty and Prohibition. Lines 11 to 13 detect if a couple of
propagated duty and prohibition makes the composed license incoherent. If that is the case, compose
returns an empty set because the licenses are incompatible and a compliant license cannot exist.</p>
        <p>Step 3. Addition of the intersection of Permissions. For each pair of permissions, one coming
from  and one from  , the lines 14 to 16 compose a new permission and add it to the resulting license.
The created permission concerns the same action as the original pair of permissions, and it contains
the intersections of the collections of constraints and of refinements from that original pair. By using
the intersection of the collections, we ensure that the created permission will be as not restrictive as
possible while still being equally or more restrictive than the original pair.</p>
        <p>Step 4. Ensuring coherency of Permissions vis-à-vis the Duties and Prohibitions. Lines 17 to
24 ensure the coherency of the domains of Permissions vis-à-vis the domains of Duties and Prohibitions
by removing the values of the domain of each permission that contradicts a prohibition or duty. For
that, our approach consists of only keeping subsets of each permission. Lines 18 to 24 keep the subsets
of each permission which do not contradict a prohibition or duty, those correspond to the parts of
which the collections of refinements or constraints do not intersect with the collections of refinement
or constraints of the prohibition or duty. We only add back the parts with non-empty collections. Lines</p>
        <sec id="sec-2-6-1">
          <title>Algorithm 1: Compose a pair of complex licenses.</title>
          <p>20 and 21 keeps the subset of the permission that has diferent refinements from the prohibition or duty,
without changing its constraint. This corresponds to the collections of refinements of the prohibition
or duty subtracted to the collection of refinements of the permission (cf. Definition 2). Then, Lines 22
and 23 keeps the subset of the permission that has the same refinements as the prohibition or duty,
but diferent constraints. This corresponds to the intersection of the collections of refinements (cf.
Definition 2) and to the collection of constraints of the permission minus the collection of constraints
of the prohibition or duty (cf Definition 1). Finally, on Line 24, the subsets of each Permission replace
the Permissions of the new license.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Use cases of license composition</title>
      <p>This section illustrates our approach with the composition of two pairs of licenses, one simple case and
one complex case. The simple use case concerns Creative Commons licenses, which do not contain
constraints or refinements. It is developed in Section 4.1. The complex use case is the one shown in
Figure 1, it explores most steps of Algorithm 1. It is developed in Section 4.2.
4.1. Use case with Creative Commons licenses
A simple example, such as the composition of Creative Commons licenses, helps showcasing the
soundness of Algorithm 1. We describe the composition of CC BY13 and CC BY-NC14 whose composition
produces CC BY-NC. That is because CC BY-NC is compliant to CC BY.</p>
      <p>The expressions of CC BY and CC BY-NC following Definition 3 are shown in Figure 2. The license
CC BY permits the five actions Distribution, Reproduction, Sharing, Derivative Works, and Commercial
Use. It obliges the actions Notice and Attribution, and it prohibits none. The license CC BY-NC permits
the four actions Distribution, Reproduction, Sharing, and Derivative Works. It obliges the actions Notice
and Attribution, and it prohibits the action Commercial Use.</p>
      <p>When composing licenses with no contextual constraints or refinements, Algorithm 1 keeps every
duty and prohibition present in at least one license, and every permission present in both licenses.
Step 1 of Algorithm 1 will add to the new license the obligations of Notice and Attribution, originating
from the two licenses as well as the prohibition of Commercial Use. Step 3 adds permissions contained
in both CC BY and CC BY-NC. Steps 2 and 4 of the algorithm have no impact in this example. The
resulting composed license is perfectly equivalent to CC BY-NC.
4.2. Complex use case with constraints and refinements
This section explains how CLiC obtains the license L3 of Figure 1 using Algorithm 1. We first describe
the licenses L1 and L2 from Figure 1 as complex licenses (cf. Definition 3). The license L1 corresponds to
the following complex license. We name the rules of L1 respectively A, B, and C according to Figure 1.
1: { (Permission, Distribution, {(dateTime, {| &gt; 2030})}, {(mediaType, {TV, online streaming})}) , #A
(Duty, Compensate, ∅, {(payAmount, {1000$})}) , #B
(Prohibition, Commercial Use, {(dateTime, {| ≤ 2050}) , (spatial, {| ⊆ Europe})}, ∅) #C }
The license L2 corresponds to the following complex license. We name the rules of L2 D, E, and F.
2: { (Permission, Distribution, {(dateTime, {| ≤ 2050})}, {(mediaType, {TV, online streaming, movies})}) , #D
(Permission, Distribution, ∅, {(mediaType, {journal, books})}) , #E
(Prohibition, Distribution, {(dateTime, {| ≤ 2040})}, {(mediaType, {TV})}) #F}}
13https://creativecommons.org/licenses/by/4.0/deed.en
14https://creativecommons.org/licenses/by-nc/4.0/deed.en</p>
      <p>In the following paragraphs, we compose the complex licenses L1 and L2 following Algorithm 1.</p>
      <p>Step 1 adds every duty and prohibition from L1 and L2 into the new license, this leads to the addition
of three rules, the duty B and the prohibition C from L1 as well as the prohibition F from L2. As there is
no duty or prohibition contained in another prohibition or duty, we keep every rule in the new license.</p>
      <p>Step 2 verifies if the composition is possible. It verifies that no pair of rules defined on a same action,
one with the status Duty and one with the status Prohibition, have intersecting collections of constraints
and refinements. This example has no issue because the rule B is defined on the action Compensate,
while the rules C and F are defined on the actions Commercial Use and Distribution.</p>
      <p>Step 3 composes rules A and D, and rules A and E, but the latter has no result. On the
one hand, the combination of rules A and E does not lead to a new permission as their
collections of refinements have no intersection, i.e., ( mediaType, {TV, online streaming}) ∩ (mediaType,
{journals, books}) = ∅. On the other hand, the combination of rule A in L1 and rule D in L2
leads to the new rule A•D. This new rule is defined on the status Permission, the action
Distribution, and contains the intersection of the collections of both original permissions as its
collections of constraints and refinements. Here, the intersection of the collections of constraints
is {(dateTime, {| &gt; 2030})} ∩ {(dateTime, {| ≤ 2050})}, which is equal to the collection:
{(dateTime, {|2030 &lt;  ≤ 2050})}. And the intersection of the collections of refinements is
{(mediaType, {TV, online streaming})} ∩ {(mediaType, {TV, online streaming, movies})}, which
is equal to the collection {(mediaType, {TV, online streaming})}. Therefore, this step adds
(temporally) the rule A•D = (Permission, Distribution, {(dateTime, {|2030 &lt;  ≤ 2050})},
{(mediaType, {TV, online streaming})}).</p>
      <p>Step 4 ensures that the permissions of the new license do not contradict its prohibitions or duties.
Therefore, rule A•D is compared with duty B and prohibitions C and F. The comparison of rule A•D
with B and C does not raise any issue as A•D is defined on the action Distribution, B on the action
Compensate, and C on the action Commercial Use. The comparison of rules A•D and F is more
complex as both are defined on the action Distribution. Therefore, A •D is removed from the new
license and two new rules are created, named A•D’ and A•D”. A•D’ and A•D” are versions of A•D with
truncated collections of constraints and refinements that prevent the potential contradiction with the
prohibition F. Following the formulas of Algorithm 1, the two rules are the following: A•D’ = (Permission,
Distribution, {(dateTime, {|2030 &lt;  ≤ 2050})}, {(mediaType, {online streaming})}), and A•D”
= (Permission, Distribution, {(dateTime, {|2040 &lt;  ≤ 2050})}, {(mediaType, {TV})}).</p>
      <p>After the four steps, the new license created corresponds to the following complex license, which
equals the license L3 in Figure 1.</p>
      <p>3: { (Permission, Distribution, {(dateTime, {|2030 &lt;  ≤ 2050})}, {(mediaType, {online streaming})}) , #A · D′
(Permission, Distribution, {(dateTime, {|2040 &lt;  ≤ 2050})}, {(mediaType, {TV})}) , #A · D′′
(Duty, Compensate, ∅, {(payAmount, {1000$})}) , #B
(Prohibition, Commercial Use, {(dateTime, {| ≤ 2050}) , (spatial, {| ⊆ Europe})}, ∅) , #C
(Prohibition, Distribution, {(dateTime, {| ≤ 2040})}, {(mediaType, {TV})}) #F }</p>
    </sec>
    <sec id="sec-4">
      <title>5. Discussion</title>
      <p>As described, CLiC will allow for data re-use by providing a way to automatically compose new licenses
in order to cover a material derived from diferent sources (see Figure 3, left part). From a lay person’s
point of view, such an automatisation of the license’s composition based upon various licenses with
complexes constraints that defer from one another will ofer a relief. As the analysis and composition
efort is handled by the algorithm, CLiC is an incentive for data-sharing. In this regard, our research
ofers promising perspectives for digital rights management in complex data-sharing scenarios.</p>
      <p>The next step of such a work will be to translate the machine-readable composed license into natural
language (see Figure 3, right part). Indeed, so far the composed license is ofered in a machine-readable
format but, in order to reach maximum utility, the license will need to be translated in a natural language
in order not to condition its reading and application to the use of complex computer means. In this
regards, it seems only logical to convey a contractual document, such as a license destined to human
Resource 1
Machliicneen-sreea2dable
Resource 2
Machine- readable</p>
      <p>license 3
Resource 3
composition</p>
      <p>Machine-readable
composed license A</p>
      <p>Resource combined
from resources 1, 2, and 3.</p>
      <p>translation</p>
      <p>Natural language
composed license A</p>
      <p>Resource combined
from resources 1, 2, and 3.</p>
      <p>CLiC – Complex License Composition
users, into a language that humans can make sens of. From a legal point of view, this human-readable
license will be a prerequisite to demonstrate the license’s existence in the case of a legal action as trying
to enforce in court a machine-readable version of the license will prove to be complex and will question
its validity. However, this essential task of translation, from machine-readable to natural language
can also be computerised as well, using the ODRL vocabulary15. Indeed, the definitions attached to
each ODRL concept can be retrieved in order to draft the natural language’s license with the selected
constraints. As RDF is structured in triples (subjects predicate object), defining simple phrases from
a machine-readable license in RDF is possible. Indeed, it would be possible to define a template in
English using the traditional structure of a license, beginning with a preamble, followed by definitions
that clarify the terms and actions used. Next, the permissions, prohibitions, and obligations could be
outlined, and the template may conclude with the conditions under which the license may be revoked
and the legal consequences of non-compliance.</p>
      <p>Some limits of such an enterprise have to be acknowledged. Indeed this type of automatic natural
language drafting of a license will create a very simple and direct legal document which will be very
diferent from what one would have expected from a license. In other words, the "drafting style" will
constitute a limit. For instance, if the new composed license prohibits the commercial use of the resource,
the drafting might read: "Prohibition: the licensee has the inability to exercise commercial use over
the resource" as the definition of a prohibition, under ODRL, is "The inability to exercise an Action
over an Asset". Such a drafting is understandable and will be enforced in a court of law. However,
some users might want to correct the style and grammar in order to obtain a more human-readable
friendly version. Moreover, one might want to adapt the text by translating it into another language
such as French or German in order to adapt the license to its domestic context. This translation of the
translation is not a legal prerequisite in order to enforce a license but might appear useful in order to
disseminate the covered resource as the targeted re-users might better understand the text in her/his
native language. Such translation from one natural language to another will not be provided by ODRL
as the vocabulary is only published in English. With regards to those various limits, the user will be
invited to pay attention to the human-readable document provided for, warning that the license need
some improvement and proof-reading.</p>
      <p>To facilitate the composed license’s proof-reading, the next step, for the user, could be to use a
Large Language Model (LLM). Such tool can easily re-word the composed license to make-it more
human-friendly by generating the necessary and appropriate words. Here, again, the limits of this
process should be acknowledged. The first will be that depending on the LLM used and its training
data, the generated text’s quality will vary a lot. Indeed, if the LLM has mostly been trained on English
data, then it will perform better on a license drafted in English than on its translated versions in other
languages. Additionally, cautions should be taken when using LLMs to take into account potential
risk of harm. For instance, the composed license provided to the LLM should not include any personal
data, as those generative AI hardly comply with data protection regulations due to a series of technical
limitations that include the memorisation of personal data and their possible unwanted regurgitation.
Moreover, the user should monitor the generated content to ensure that no license’s term has been
modified and that the added text does not modify the intended meaning of the license. Therefore,
human proof-reading and verification remain the essential last step of the process in order to ensure
the license’s correctness and, where appropriate and needed, a last review by a legal counsel. Such next
steps will raise additional questions outside of the real of license composition such as in terms of the
usability and the explainability of a license.</p>
    </sec>
    <sec id="sec-5">
      <title>6. Conclusion</title>
      <p>In this work, we propose CLiC, an approach to compose complex licenses that include constraints and
refinements, as defined by ODRL. The core idea of our approach is to order constraints and refinements
based on their restrictiveness using a set-based comparison. This method ensures that the resulting
license is the least restrictive one capable of protecting a resource that combines resources protected by
diferent complex licenses. Our contribution includes a set of definitions that formalize our approach,
as well as an algorithm to facilitate its implementation.</p>
      <p>CLiC aims to simplify and encourage the reuse and publication of licensed resources. It does not
intend to provide legal advice but rather to ofer a practical solution for users who may not seek such
advice yet wish to combine various resources and generate an appropriate license. CLiC provides a tool
that ensures the composed complex license does not infringe upon the licenses of the reused resources.
By alleviating the burden of extensive legal analysis and the comparison of multiple licenses, CLiC
introduces an innovative perspective as a data-sharing management tool. A future direction of this work
is to define a methodology for translating machine-readable licenses into human-readable ones. Such a
process could leverage the ODRL vocabulary, LLMs to enhance readability, and human verifications.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used ChatGPT to improve grammar and for spelling.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48</p>
      <sec id="sec-6-1">
        <title>Listing 1: License L1 expressed with ODRL.</title>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>A. Appendix</title>
      <p>The three licenses of Figure 1 in ODRL using the Turtle syntax.
@ p r e f i x r d f : &lt; h t t p : / / www. w3 . org / 1 9 9 9 / 0 2 / 2 2 − r d f − s y n t a x − ns #&gt; .
@ p r e f i x r d f s : &lt; h t t p : / / www. w3 . org / 2 0 0 0 / 0 1 / r d f −schema #&gt; .
@ p r e f i x o d r l : &lt; h t t p : / / www. w3 . org / ns / o d r l / 2 / &gt; .
@ p r e f i x c c : &lt; h t t p : / / c r e a t i v e c o m m o n s . org / ns #&gt; .
@ p r e f i x xsd : &lt; h t t p : / / www. w3 . org / 2 0 0 1 / XMLSchema#&gt; .
@ p r e f i x : &lt; h t t p : / / example . com/ &gt; .
: L1 a o d r l : O f f e r ;
o d r l : p e r m i s s i o n [
r d f s : l a b e l "A" ;
a o d r l : P e r m i s s i o n ;
o d r l : a c t i o n [
r d f : v a l u e c c : D i s t r i b u t i o n ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " TV " @en " o n l i n e s t r e a m i n g " @en ) ] ] ;
o d r l : c o n s t r a i n t [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : g t ;
o d r l : r i g h t O p e r a n d " 2 0 3 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e ]
] ;
o d r l : o b l i g a t i o n [
r d f s : l a b e l " B " ;
a o d r l : Duty ;
o d r l : a c t i o n [
r d f : v a l u e o d r l : compensate ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : payAmount ;
o d r l : o p e r a t o r o d r l : eq ;
o d r l : r i g h t O p e r a n d " 1 0 0 0 " ^ ^ xsd : d e c i m a l ;
o d r l : u n i t &lt; h t t p s : / / d b p e d i a . org / page / U n i t e d _ S t a t e s _ d o l l a r &gt; ] ]
] ;
o d r l : p r o h i b i t i o n [
r d f s : l a b e l " C " ;
a o d r l : P r o h i b i t i o n ;
o d r l : a c t i o n c c : CommercialUse ;
o d r l : c o n s t r a i n t [
a o d r l : L o g i c a l C o n s t r a i n t ;
o d r l : and ( [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 5 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e</p>
      <p>Listing 2: License L2 expressed with ODRL.
: L2 a o d r l : O f f e r ;
o d r l : p e r m i s s i o n [
r d f s : l a b e l "D" ;
a o d r l : P e r m i s s i o n ;
o d r l : a c t i o n [
r d f : v a l u e c c : D i s t r i b u t i o n ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " TV " @en " o n l i n e s t r e a m i n g " @en " movies " @en ) ] ] ;
o d r l : c o n s t r a i n t [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 5 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e ]
] , [
r d f s : l a b e l " E " ;
a o d r l : P e r m i s s i o n ;
o d r l : a c t i o n [
r d f : v a l u e o d r l : compensate ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " j o u r n a l s " @en " books " @en ) ] ]
] ;
o d r l : p r o h i b i t i o n [
r d f s : l a b e l " F " ;
a o d r l : P r o h i b i t i o n ;
o d r l : a c t i o n [</p>
      <p>r d f : v a l u e c c : D i s t r i b u t i o n ;</p>
      <p>o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " TV " @en ) ] ] ;
o d r l : c o n s t r a i n t [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 4 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e ]
: L3 a o d r l : O f f e r ;
o d r l : p e r m i s s i o n [
r d f s : l a b e l "A . D ’ " ;
a o d r l : P e r m i s s i o n ;
o d r l : a c t i o n [
r d f : v a l u e c c : D i s t r i b u t i o n ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " o n l i n e s t r e a m i n g " @en ) ] ] ;
o d r l : c o n s t r a i n t [
a o d r l : L o g i c a l C o n s t r a i n t ;
o d r l : and ( [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : g t ;
o d r l : r i g h t O p e r a n d " 2 0 3 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e</p>
      <p>Listing 3: License L3 expressed with ODRL.
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 5 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e ] ) ]
] , [
r d f s : l a b e l "A . D ’ ’ " ;
a o d r l : P e r m i s s i o n ;
o d r l : a c t i o n [
r d f : v a l u e o d r l : compensate ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " TV " @en ) ] ] ;
o d r l : c o n s t r a i n t [
a o d r l : L o g i c a l C o n s t r a i n t ;
o d r l : and ( [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : g t ;
o d r l : r i g h t O p e r a n d " 2 0 4 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 5 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e ] ) ]
] ;
o d r l : o b l i g a t i o n [
r d f : l a b e l " B " ;
a o d r l : Duty ;
o d r l : a c t i o n [
r d f : v a l u e o d r l : compensate ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : payAmount ;
o d r l : o p e r a t o r o d r l : eq ;
o d r l : r i g h t O p e r a n d " 1 0 0 0 " ^ ^ xsd : d e c i m a l ;
o d r l : u n i t &lt; h t t p s : / / d b p e d i a . org / page / U n i t e d _ S t a t e s _ d o l l a r &gt; ] ]
] ;
o d r l : p r o h i b i t i o n [
r d f s : l a b e l "C" ;
a o d r l : P r o h i b i t i o n ;
o d r l : a c t i o n c c : CommercialUse ;
o d r l : c o n s t r a i n t [
a o d r l : L o g i c a l C o n s t r a i n t ;
o d r l : and ( [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 5 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e
] , [
r d f s : l a b e l " F " ;
a o d r l : P r o h i b i t i o n ;
o d r l : a c t i o n [
r d f : v a l u e c c : D i s t r i b u t i o n ;
o d r l : r e f i n e m e n t [
o d r l : l e f t O p e r a n d o d r l : mediaType ;
o d r l : o p e r a t o r o d r l : isAnyOf ;
o d r l : r i g h t O p e r a n d ( " TV " @en ) ] ] ;
o d r l : c o n s t r a i n t [
o d r l : l e f t O p e r a n d o d r l : dateTime ;
o d r l : o p e r a t o r o d r l : l t e q ;
o d r l : r i g h t O p e r a n d " 2 0 4 0 − 1 2 − 3 1 " ^ ^ xsd : d a t e ]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Moreau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Serrano-Alvarado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Perrin</surname>
          </string-name>
          , E. Desmontils, Modelling the Compatibility of Licenses, in: P. Hitzler,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fernández</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Janowicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zaveri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Gray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lopez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Haller</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          Hammar (Eds.),
          <source>The Semantic Web</source>
          , Springer International Publishing, Cham,
          <year>2019</year>
          , pp.
          <fpage>255</fpage>
          -
          <lpage>269</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -21348-0_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>d'Aquin, Privacy, security and policies: A review of problems and solutions with semantic web technologies</article-title>
          ,
          <source>Semantic Web</source>
          <volume>9</volume>
          (
          <year>2018</year>
          )
          <fpage>153</fpage>
          -
          <lpage>161</lpage>
          . URL: https://journals.sagepub.com/doi/full/10. 3233/SW-180289. doi:
          <volume>10</volume>
          .3233/SW-180289.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Gangadharan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weiss</surname>
          </string-name>
          , V.
          <string-name>
            <surname>D'Andrea</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Iannella</surname>
          </string-name>
          ,
          <article-title>Service License Composition and Compatibility Analysis</article-title>
          , in: D.
          <string-name>
            <surname>Hutchison</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Kanade</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kittler</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          <string-name>
            <surname>Kleinberg</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Mattern</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          <string-name>
            <surname>Mitchell</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Naor</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Nierstrasz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Pandu Rangan</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Stefen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Sudan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Terzopoulos</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Tygar</surname>
            ,
            <given-names>M. Y.</given-names>
          </string-name>
          <string-name>
            <surname>Vardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Weikum</surname>
            ,
            <given-names>B. J.</given-names>
          </string-name>
          <string-name>
            <surname>Krämer</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-J. Lin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          Narasimhan (Eds.),
          <string-name>
            <surname>Service-Oriented</surname>
            <given-names>Computing - ICSOC</given-names>
          </string-name>
          <year>2007</year>
          , volume
          <volume>4749</volume>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2007</year>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>269</lpage>
          . URL: http://link.springer.com/10.1007/978-3-
          <fpage>540</fpage>
          -74974-5_
          <fpage>21</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -74974-5_21, series Title: Lecture Notes in Computer Science.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Governatori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rotolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gandon</surname>
          </string-name>
          , One License to Compose Them All, in: H.
          <string-name>
            <surname>Alani</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Fokoue</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Groth</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Biemann</surname>
            ,
            <given-names>J. X.</given-names>
          </string-name>
          <string-name>
            <surname>Parreira</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Aroyo</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Noy</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Welty</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          Janowicz (Eds.),
          <source>The Semantic Web - ISWC 2013</source>
          , Springer, Berlin, Heidelberg,
          <year>2013</year>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>166</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -41335-3_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mesiti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Perlasca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Valtolina</surname>
          </string-name>
          ,
          <article-title>On the Composition of Digital Licenses in Collaborative Environments</article-title>
          , in: H.
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Lhotská</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Link</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Basl</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          <string-name>
            <surname>Tjoa</surname>
          </string-name>
          (Eds.),
          <source>Database and Expert Systems Applications</source>
          , Springer, Berlin, Heidelberg,
          <year>2013</year>
          , pp.
          <fpage>428</fpage>
          -
          <lpage>442</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -40285-2_
          <fpage>37</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Pellegrini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Mireles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Steyskal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Panasiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fensel</surname>
          </string-name>
          , S. Kirrane,
          <source>Automated Rights Clearance Using Semantic Web Technologies: The DALICC Framework</source>
          , in: T.
          <string-name>
            <surname>Hoppe</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Humm</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Reibold (Eds.),
          <source>Semantic Applications</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2018</year>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>218</lpage>
          . URL: http://link.springer. com/10.1007/978-3-
          <fpage>662</fpage>
          -55433-3_
          <fpage>14</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -55433-3_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Gangadharan Ramakrishnan</surname>
          </string-name>
          , V.
          <string-name>
            <surname>D'Andrea</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Iannella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Weiss</surname>
          </string-name>
          , ODRL/L(S)
          <article-title>: A Language for Service Licensing (</article-title>
          <year>2007</year>
          ). URL: https://iris.unitn.it/handle/11572/357868, accepted:
          <fpage>2023</fpage>
          -
          <lpage>12</lpage>
          -01T11:
          <fpage>51</fpage>
          :08Z Publisher: Trento.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>