<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>B. Esteves);
https://ruben.verborgh.org/ (R. Verborgh)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>LOAMA: Low-code ODRL Access Management Application</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Wout Slabbinck</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lennert De Rouck</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joachim Van Herwegen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wouter Termont</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Beatriz Esteves</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ruben Verborgh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>IDLab, Department of Electronics and Information Systems, Ghent University - imec</institution>
          ,
          <country country="BE">Belgium</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>s the complexity of managing policies, by providing a tool that people not familiar with policy languages can use to manage their preferences regarding access management. Future works includes the expansion of the LOAMA UI to support further ODRL constraints, e.g., to express purpose-based or temporal usage control policies.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;access and usage control</kwd>
        <kwd>policy management</kwd>
        <kwd>User-Managed Access</kwd>
        <kwd>ODRL</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Discussions on authorization mechanisms for decentralized (data) spaces exhibit a certain
tension between high-level conceptual (legal or economic) requirements and low-level technical
mechanisms, precluding the emergence of a broadly accepted integration between the two. New
authorization frameworks are typically developed in the context of emerging data (exchange)
technologies, which focus predominantly on the resource level (i.e., the data plane), rather
than on interoperability in policy management and enforcement (i.e., the control plane). New
conceptual frameworks, formulated in a corporate or political context using non-technical
terminology, often fail to gain a foothold in technical implementation. Together, this results
in a plethora of non-interoperable systems and proposals, between which development and
interaction are a costly afair.</p>
      <p>
        This tension is particularly visible in recent attempts at streamlining private data exchange
on the Web, including i) several parallel eforts shaping Data Spaces (e.g., by IDSA, DSSC,
Gaia-X, and Eclipse [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2, 3, 4</xref>
        ]), which struggle to suficiently align their conceptual visions
into concrete interoperable technical specifications 1; ii) numerous new regulations that impose
data processing and governance requirements without much of a technical stack ready to
facilitate them (e.g., in European Union law [6, 7, 8, 9]); and iii) multiple independent technical
frameworks for (personal) data exchange, including the Solid and Fedora projects [10, 11]2,
which fail to provide a foundation for many of the use cases formulated by the other endeavours.
      </p>
      <p>In [18], the authors highlight the lack of orthogonality between the data plane and the control
plane in existing technical solutions3, and their hierarchical, document-centric view of data,
since it forms an inflexible dependency between internal and external interfaces for data and
access management, and thus precludes the organic formation of an interoperable and scalable
ecosystem in which Digital Trust flows from a variety of mutually beneficial relationships.</p>
      <p>In this paper, we introduce LOAMA, a user interface designed to manage policies in an UMA
Authorization Server (AS). LOAMA simplifies the complexity of policy management, ofering
an intuitive experience for users, while the underlying API supports the exchange of complete
and detailed policies. To demonstrate the functionality of our implementation, we also provide
a screencast.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        These issues are partially addressed by the Solid Application Interoperability (SAI)
specification [20, 21], 4 which proposes to combine a registration-based policy model with more
ifne-grained, declarative resource description languages (e.g., SHACL [ 22], SHEX [
        <xref ref-type="bibr" rid="ref5">23</xref>
        ]), and
User-Managed Access (UMA) [
        <xref ref-type="bibr" rid="ref6 ref7">24, 25</xref>
        ] – an OAuth 2.0 extension enabling asynchronous and
delegated multi-user access control, dynamic grant negotiation, and federation over multiple
protection domains.
      </p>
      <p>
        Still, SAI’s policy language lacks any legal or corporate semantics and expressivity, forming
only a technical interoperability layer on top of WAC or ACP. Several authors highlight this
shortcoming (with demo implementations in [
        <xref ref-type="bibr" rid="ref8 ref9">26, 27</xref>
        ]), stating that since "[WAC and ACP]
cannot represent more complex rules nor invoke regulation-specific concepts," [
        <xref ref-type="bibr" rid="ref10">28</xref>
        ], Solid still
lacks "the necessary vocabulary and processes for ensuring transparency and accountability
[...] to deal with the obligations and requirements required by [them]," [
        <xref ref-type="bibr" rid="ref11">29</xref>
        ], as well as "the
granularity and contextual awareness needed to enforce these regulatory requirements" [
        <xref ref-type="bibr" rid="ref9">27</xref>
        ].
Each of these papers emphasizes the importance of usage control over mere access control;5 and
suggests an integration with the Open Digital Rights Language (ODRL) and the Data Privacy
1E.g., Eclipse’s Dataspace Protocol [5] merely mentions that "requests [...] SHOULD use the Authorization
header to include an authorization token [the semantics of which] are not part of this specification."
2Their core texts [12, 13], based on the Linked Data Platform (LDP), Web Access Control (WAC), and Access
Control Policy (ACP) specifications [ 14, 15, 16], now inform W3C’s Linked Web Storage (LWS) Working Group [17].
      </p>
      <p>3This separation of concerns between resource servers (data management) and authorization servers (access
management) is ubiquitous in modern access control mechanisms, such as OAuth 2.0 [19].</p>
      <p>
        4Surprisingly, the SAI specification has not been taken up as input by the W3C LWS WG (cf. 2).
Vocabulary (DPV) [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">30, 31, 32</xref>
        ].
      </p>
      <p>
        A key piece often overlooked in these architectural designs is how policies should be
concretely managed by the resource owner [
        <xref ref-type="bibr" rid="ref15">33</xref>
        ]. As [21] succinctly put: "Solid’s use of [WAC and
ACP] is tedious and prone to errors"; "little attention has been given to how users [...] would
actually exert their control." Although the paper discusses a prototype implementation of a user
interface based on SAI and DPV, the authors identify several limitations and open issues. Other
similar applications [
        <xref ref-type="bibr" rid="ref16 ref17">34, 35</xref>
        ] restrict themselves to SAI and WAC or ACP, ignoring the important
insights from previous work around ODRL and DPV.
      </p>
      <p>
        The whitepaper From Resource Control to Digital Trust with User-Managed Access [18] builds
on this earlier work around Solid and ODRL, and identifies several requirements that a technical
solution for access and usage control should fulfill in order to form a strong connection to
legal and corporate conceptual frameworks. The authors suggest a number of modifications to
UMA, which they integrate in the UMA-extension Authorization for Data Spaces (A4DS) [36].
In line with the attempts of [
        <xref ref-type="bibr" rid="ref17">21, 35</xref>
        ], this demo paper will discuss and showcase the foundations
of a third authorization application, which communicates through ODRL messages with an
authorization server following the A4DS UMA extension.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Access Management Application</title>
      <sec id="sec-3-1">
        <title>3.1. Architecture</title>
        <p>
          The design of LOAMA builds upon the architecture of UMA, which defines five key roles [
          <xref ref-type="bibr" rid="ref6">24</xref>
          ].
Before elaborating on our design and implementation choices, we briefly introduce these five
roles: i) the Resource Owner (RO), who manages access policies for protected resources; ii) the
Requesting Party (RP), who seeks access to a protected resource; iii) the Client, which acts
on behalf of the RP and interacts with both the Resource Server and Authorization Server while
adhering to the UMA flow; iv) the Resource Server (RS), which hosts the protected resources
on behalf of the RO; v) the Authorization Server (AS), which enforces access control policies
and issues tokens to the Client on behalf of the RO. UMA does not specify how an RO should
configure policies at the AS 6, but leaves this up to the implementer. Illustrated in Figure 1, our
architecture therefore incorporates a sixth role, the Access Management Application (AMA),
which acts as an intermediary between the RO and the AS. To enable this interaction, the AS
must expose a dedicated interface through which the AMA can communicate policy updates on
behalf of the RO.
        </p>
        <sec id="sec-3-1-1">
          <title>Authorization Server</title>
          <p>Since UMA leaves policy management open to the implementers, the first step for making
policy management possible is devising an API endpoint. A quick study of well-known access
control solutions’ endpoints, including the Policy Administration Point (PAP) of XACML [37]
5While access control is merely concerned with which parties can access what resources, usage control includes
the conditions and obligations associated with this authorization.</p>
          <p>
            6The UMA 2.0 Grant specification [
            <xref ref-type="bibr" rid="ref6">24</xref>
            ] explicitly states that the AS-RO interface is out of scope in §6.1. Similar
remarks are made in the Federated Authorization for UMA specification [
            <xref ref-type="bibr" rid="ref7">25</xref>
            ], in §1.2 and §8.
          </p>
          <p>Requesting</p>
          <p>Party</p>
          <p>Client</p>
          <p>Resource Server
Authorization Server</p>
          <p>Access Management</p>
          <p>Application</p>
          <p>Resource</p>
          <p>Owner
and the Open Policy Agent API [38], showcases that best practices use REST APIs [39]. As
such, we developed a REST API for Creating, Reading, Updating and Deleting (CRUD) ODRL
policies, that builds upon the UMA Authorization Server introduced by [40], which enforces
usage control using ODRL policies [41].</p>
          <p>
            In addition to the API design, there are some further design considerations implemented to
ensure the correct handling of incoming requests, which are grouped into two main categories:
i) syntactic payload validation and ii) security mechanisms. Syntactic validation targets the
structural correctness of policies modeled using the ODRL Information Model [
            <xref ref-type="bibr" rid="ref12">30</xref>
            ], which is
defined as an RDF ontology [
            <xref ref-type="bibr" rid="ref13">31</xref>
            ]. The first step involves verifying that the request payload is of an
RDF-compatible content type and can be successfully parsed. Subsequently, the parsed payload
is checked for conformance with the ODRL Information Model. The security mechanisms
employed ensure that no unauthorized policy management can be executed. First, the presence
of an Authorization header in incoming requests is verified. The identifier of the RO is then
derived from the information in this header. Requests to read or modify policies are permitted
only if the RO’s identifier matches the odrl:assigner property specified in the corresponding
ODRL rule. More information about the REST API endpoint and implementation details can be
found in the documentation of the repository7.
          </p>
        </sec>
        <sec id="sec-3-1-2">
          <title>User Interface</title>
          <p>The LOAMA User Interface (UI) abstracts away the complexity of manual ODRL policy creation
and executes API calls to the aforementioned UMA AS. It consists of three main components:
an Authentication page, an Overview page, and a Policy Editor page.</p>
          <p>The landing page of the UI is the Authentication page, where ROs authenticate using
SolidOIDC [42]. Upon successful authentication, the UI obtains the RO’s credentials, enabling it to
issue authorized requests. After authentication, the user is redirected to the Overview page
(Figure 2), which displays all resources under the control of the authenticated RO. Selecting
a resource brings the user to the Policy Editor page. In the Policy Editor, the RO can define
7UMA Policy Management documentation and implementation details: https://github.com/SolidLabResearch/
user-managed-access/blob/feat/policy-endpoint/docs/policy-management.md
and modify access control rules for each resource. Specifically, the RO may assign one or more
odrl:assignees and specify the corresponding permitted odrl:actions. Any changes
made through the interface are automatically propagated to the Authorization Server via the
appropriate API calls. The source code for the UI is publicly available in its GitHub repository8.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Demonstration</title>
        <p>We illustrate the use of the policy management API and LOAMA UI through a scenario in which
Alice, the Resource Owner, grants access to Bob, the Requesting Party. Initially unauthorized,
Bob is unable to read or update the resource. After Alice updates the policy using the LOAMA
interface, Bob successfully performs the intended actions. A complete video demonstration of
this scenario, including further details, is available on Zenodo9.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>
        The choice for a RESTful API for ODRL policy management for an UMA AS empowers ROs
with fine-grained, low-level control over how usage of their data is enforced. At the same time,
the LOAMA interface demonstrates how this complexity can be abstracted away, enabling ROs
to understand and manage ODRL policies without requiring detailed knowledge of either ODRL
or the API interactions. The implementation of the policy management API led to insights
on open issues. First, there is a security consideration, namely the need for a mechanism to
prevent unauthorized applications from altering policies. For instance, when a Resource Owner
authenticates through a generic application to access data, the resulting authentication token
8LOAMA with UMA: https://github.com/SolidLabResearch/loama/tree/feat/odrl
9LOAMA demonstration with the UMA AS policy management API: https://zenodo.org/records/16640205
could be exploited by malicious code to modify policies. To address this risk, it is advisable
to restrict policy changes to certified applications only. This concern has also been noted
in research on decentralized data sharing solutions [
        <xref ref-type="bibr" rid="ref17">35</xref>
        ]. Another open issue is the need for
semantic validation in the AS to prevent contradicting ODRL rules, such as a permission and
a prohibition for the same asset, action, and party. If such validation cannot be enforced, an
additional safeguard is required: efective conflict resolution strategies must be in place to
support consistent decision-making within the UMA AS policy engine. Finally, there is a need
for a mechanism to request specific permissions from a RO, which is currently missing in
the implementation. However, the existing AS can serve as a foundation for further research;
perhaps it can be used to compare existing decentralized negotiation strategies, including the
Dataspace Negotiation Protocol10 [43], SAI [20], or Authapp [
        <xref ref-type="bibr" rid="ref17">35</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this paper, we introduce an ODRL policy management API for a UMA Authorization Server
along with LOAMA, a web-based user interface that enables Resource Owners to manage their
policies more easily. Future research includes conflict resolution in policy management and
decentralized access negotiation mechanisms.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This research was funded by SolidLab Vlaanderen (Flemish Government, EWI and RRF project
VV023/10), and the European Union’s Horizon Europe research and innovation program under
grant agreement no. 101058682 (Onto-DESIDE).</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used Grammarly in order to: Grammar and
spelling check. After using this tool/service, the author(s) reviewed and edited the content as
needed and take(s) full responsibility for the publication’s content.
[5] P. Koen, M. Kollenstart, J. Marino, J. Pampus, A. Turkmayali, S. Steinbuss, A. Weiß,
Dataspaces Protocol 2025-1-RC4, Technical Report, Eclipse Foundation, 2025.
[6] Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016
on the protection of natural persons with regard to the processing of personal data and on
the free movement of such data, and repealing Directive 95/46/EC (General Data Protection
Regulation), 2016. URL: ttp://data.europa.eu/eli/reg/2016/679/oj.
[7] Regulation (EU) 2022/868 of the European Parliament and of the Council of 30 May 2022
on European data governance and amending Regulation (EU) 2018/1724 (Data Governance
Act), 2022. URL: http://data.europa.eu/eli/reg/2022/868/oj/eng.
[8] Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October
2022 on a Single Market For Digital Services and amending Directive 2000/31/EC (Digital
Services Act), 2022. URL: http://data.europa.eu/eli/reg/2022/2065/oj/eng.
[9] Regulation (EU) 2023/2854 of the European Parliament and of the Council of 13 December
2023 on harmonised rules on fair access to and use of data and amending Regulation (EU)
2017/2394 and Directive (EU) 2020/1828 (Data Act), 2023. URL: http://data.europa.eu/eli/
reg/2023/2854/oj.
[10] Open Data Initiative, Solid Project, https://solidproject.org/, 2025. Accessed: 2025-07-31.
[11] Fedora Governance Group, Fedora Repository, https://fedorarepository.org/, 2025.
Accessed: 2025-07-31.
[12] W3C Solid Community Group, Solid Protocol, Editor’s Draft, W3C, 2025.
[13] Fedora Governance Group, Fedora API, Candidate Recommendation, Fedora, 2018.
[14] W3C Linked Data Platform Working Group, Linked Data Platform 1.0, Recommendation,</p>
      <p>W3C, 2015.
[15] W3C Solid Community Group, Web Access Control, Draft Community Group Report,</p>
      <p>W3C, 2025.
[16] W3C Solid Community Group, Access Control Policy, Editor’s Draft, W3C, 2022.
[17] A. Coburn, L. Debackere, E. Prud’hommeaux, Linked Web Storage Working Group
Charter, Working Group Charter, W3C, 2024. URL: https://www.w3.org/2024/09/
linked-web-storage-wg-charter.html.
[18] W. Termont, R. Dedecker, W. Slabbinck, B. Esteves, B. De Meester, R. Verborgh, From
Resource Control to Digital Trust with User-Managed Access, Technical Report, SolidLab
(IDLab, Ghent University – imec), 2024.
[19] D. Hardt, The OAuth 2.0 Authorization Framework, Technical Report 6749, IETF, 2012.</p>
      <p>URL: https://www.rfc-editor.org/info/rfc6749. doi:10.17487/RFC6749.
[20] W3C Solid Community Group, Solid Application Interoperability, Draft Community Group</p>
      <p>Report, W3C, 2025.
[21] H. Bailly, A. Papanna, R. Brennan, Prototyping an End-User User Interface for the Solid
Application Interoperability Specification Under GDPR, in: C. Pesquita, E. Jimenez-Ruiz,
J. McCusker, D. Faria, M. Dragoni, A. Dimou, R. Troncy, S. Hertling (Eds.), The Semantic
Web: 20th International Conference, ESWC 2023, May 28–June 1, Proceedings, volume
13870 of Lecture Notes in Computer Science, Springer, Cham, Switzerland, 2023, pp. 557–573.
doi:10.1007/978-3-031-33455-9_33.
[22] W3C RDF Data Shapes Working Group, Shapes Constraint Language (SHACL),
Recommendation, W3C, 2017. URL: https://www.w3.org/TR/shacl/.
in Computer Science, Springer, Cham, Switzerland, 2024, pp. 199–214. doi:10.1007/
978-3-031-62362-2_14.
[36] W. Termont, Authorization for Data Spaces, Technical Report, KNoWS (IDLab, Ghent</p>
      <p>University – imec), 2025.
[37] B. Parducci, H. Lockhart, E. Rissanen, eXtensible Access Control Markup Language
(XACML) Version 3.0 – OASIS Standard, 2013. URL: http://docs.oasis-open.org/xacml/3.0/
xacml-3.0-core-spec-en.html.
[38] Open Policy Agent - Policy API, 2025. URL: https://www.openpolicyagent.org/docs/
rest-api#policy-api.
[39] R. T. Fielding, R. N. Taylor, Principled design of the modern Web architecture, ACM Trans.</p>
      <p>Internet Technol. 2 (2002) 115–150. URL: https://dl.acm.org/doi/10.1145/514183.514185.
doi:10.1145/514183.514185.
[40] W. Slabbinck, R. Dedecker, W. Termont, B. Esteves, P. Colpaert, R. Verborgh, From Access
Control to Usage Control with User-Managed Access, Solid Symposium 2025, Leiden, The
Netherlands, 2025. Forthcoming.
[41] W. Slabbinck, J. Rojas Meléndez, B. Esteves, P. Colpaert, R. Verborgh, Interoperable
Interpretation and Evaluation of ODRL Policies, in: E. Curry, M. Acosta, M. Poveda-Villalón,
M. van Erp, A. Ojo, K. Hose, C. Shimizu, P. Lisena (Eds.), The Semantic Web, Springer
Nature Switzerland, Cham, 2025, pp. 192–209. doi:10.1007/978-3-031-94578-6_11.
[42] W3C Solid Community Group, Solid-OIDC, Draft Community Group Report, W3C, 2022.
[43] S. Yumusak, S. Gheisari, J. O. Salas, L.-D. Ibáñez, G. Konstantinidis, Data Sharing
Negotiation and Contracting (2024). URL: https://ceur-ws.org/Vol-3828/paper39.pdf.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>International</given-names>
            <surname>Data Spaces Association</surname>
          </string-name>
          , International Data Spaces, https: //internationaldataspaces.org,
          <year>2025</year>
          . Accessed:
          <fpage>2025</fpage>
          -07-31.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Data</given-names>
            <surname>Spaces Support Centre</surname>
          </string-name>
          , https://dssc.eu,
          <year>2025</year>
          . Accessed:
          <fpage>2025</fpage>
          -07-31.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Gaia-X European</surname>
          </string-name>
          <article-title>Association for Data and Cloud, Gaia-X, https</article-title>
          ://gaia-x.eu,
          <year>2025</year>
          . Accessed:
          <fpage>2025</fpage>
          -07-31.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Eclipse</given-names>
            <surname>Foundation</surname>
          </string-name>
          , Eclipse Dataspace Working Group, https://dataspace.eclipse.org,
          <year>2025</year>
          . Accessed:
          <fpage>2025</fpage>
          -07-
          <lpage>31</lpage>
          . 10Data Space Negotiation Protocol: https://github.com/International-Data-Spaces-Association/ids-specification/ blob/main/negotiation/contract.negotiation.protocol.md
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>W3C</given-names>
            <surname>Shape Expressions Community Group</surname>
          </string-name>
          ,
          <source>Shape Expressions Language 2</source>
          .1,
          <string-name>
            <given-names>Final</given-names>
            <surname>Community</surname>
          </string-name>
          Group Report, W3C,
          <year>2019</year>
          . URL: https://shex.io/shex-semantics/.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Machulak</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Richer,</surname>
          </string-name>
          <article-title>User-Managed Access (UMA) 2.0 Grant for OAuth 2</article-title>
          .0 Authorization, Recommendation, Kantara Initiative,
          <year>2018</year>
          . URL: https://docs.kantarainitiative.org/uma/ wg/rec-oauth
          <source>-uma-grant-2</source>
          .0.html.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Machulak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Richer</surname>
          </string-name>
          ,
          <article-title>Federated Authorization for User-Managed Access (UMA) 2</article-title>
          .0,
          <string-name>
            <surname>Recommendation</surname>
          </string-name>
          , Kantara Initiative,
          <year>2018</year>
          . URL: https://docs.kantarainitiative.org/uma/ wg/rec-oauth
          <article-title>-uma-federated-authz-2.0</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>W.</given-names>
            <surname>Slabbinck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Rojas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Verborgh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Colpaert</surname>
          </string-name>
          ,
          <article-title>Enforcing Usage Control Policies in Solid using Rule-Based Web Agents</article-title>
          ,
          <source>in: Proceedings of the Posters and Privacy Session of the Solid Symposium</source>
          <year>2024</year>
          ,
          <year>2024</year>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>117</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3947</volume>
          / short15.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>L.</given-names>
            <surname>Debackere</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Colpaert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Taelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Verborgh</surname>
          </string-name>
          ,
          <article-title>A Policy-Oriented Architecture for Enforcing Consent in Solid</article-title>
          , in: F. Laforest,
          <string-name>
            <given-names>R.</given-names>
            <surname>Troncy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Médini</surname>
          </string-name>
          , I. Herman (Eds.),
          <source>Companion Proceedings of the Web Conference 2022 (WWW '22)</source>
          , Association for Computing Machinery, New York, United States,
          <year>2022</year>
          , pp.
          <fpage>516</fpage>
          -
          <lpage>524</lpage>
          . doi:
          <volume>10</volume>
          .1145/3487553.3524630.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Rodríguez-Doncel, ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid</article-title>
          , in: R.
          <string-name>
            <surname>Mutharaju</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ławrynowicz</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Bhattacharyya</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Blomqvist</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Asprino</surname>
          </string-name>
          , G.
          <source>Singh (Eds.)</source>
          ,
          <source>2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</source>
          , IEEE, Vienna, Austria,
          <year>2021</year>
          , pp.
          <fpage>298</fpage>
          -
          <lpage>306</lpage>
          . doi:
          <volume>10</volume>
          .1109/EuroSPW54576.
          <year>2021</year>
          .
          <volume>00038</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <article-title>Using Patterns to Manage Governance of Solid Apps</article-title>
          , in: R.
          <string-name>
            <surname>Mutharaju</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ławrynowicz</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Bhattacharyya</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Blomqvist</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Asprino</surname>
          </string-name>
          , G. Singh (Eds.),
          <source>Proceedings of the 14th Workshop on Ontology Design and Patterns (WOP</source>
          <year>2023</year>
          )
          <article-title>co-located with the 22nd International Semantic Web Conference (ISWC</article-title>
          <year>2023</year>
          ), volume
          <volume>3636</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>43</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>W3C</given-names>
            <surname>Permissions</surname>
          </string-name>
          &amp; Obligations Expression Working Group,
          <source>Open Digital Rights Language (ODRL) Information Model 2</source>
          .2,
          <string-name>
            <surname>Recommendation</surname>
          </string-name>
          , W3C,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>W3C</given-names>
            <surname>Permissions</surname>
          </string-name>
          &amp; Obligations Expression Working Group,
          <source>Open Digital Rights Language (ODRL) Vocabulary &amp; Expression</source>
          <volume>2</volume>
          .2,
          <string-name>
            <surname>Recommendation</surname>
          </string-name>
          , W3C,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. P.</given-names>
            <surname>Krog</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ryan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Golpayegani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Flake</surname>
          </string-name>
          ,
          <source>Data Privacy Vocabulary (DPV) - Version 2</source>
          .0, in: G. Demartini,
          <string-name>
            <given-names>K.</given-names>
            <surname>Hose</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Acosta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Palmonari</surname>
          </string-name>
          , G. Cheng, H.
          <string-name>
            <surname>Skaf-Molli</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Ferranti</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Hernández</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Hogan (Eds.),
          <source>The Semantic Web - ISWC 2024</source>
          , Springer Nature Switzerland, Cham,
          <year>2024</year>
          , pp.
          <fpage>171</fpage>
          -
          <lpage>193</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -77847-6_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>W.</given-names>
            <surname>Slabbinck</surname>
          </string-name>
          ,
          <article-title>The need for Usage Control in Decentralized and Federated Ecosystems</article-title>
          , in: K. Taylor, A. Zimmermann (Eds.),
          <source>Proceedings of the Doctoral Consortium at ISWC</source>
          <year>2024</year>
          , volume
          <volume>3884</volume>
          <source>of CEUR Workshop Proceedings</source>
          , CEUR, Baltimore, USA,
          <year>2024</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3884</volume>
          /paper2, iSSN:
          <fpage>1613</fpage>
          -
          <lpage>0073</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [34] ActivityPods, https://activitypods.org/,
          <year>2025</year>
          . Accessed:
          <fpage>2025</fpage>
          -07-31.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>A.</given-names>
            <surname>Both</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kastner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yeboah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schraudner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Käfer</surname>
          </string-name>
          , H. Andreas, AuthApp - Portable,
          <article-title>Reusable Solid App for GDPR-compliant Access Granting</article-title>
          , in: K. Stefanidis,
          <string-name>
            <given-names>K.</given-names>
            <surname>Systä</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kondylakis</surname>
          </string-name>
          , E. Quintarelli (Eds.),
          <source>Web Engineering: 24th International Conference (ICWE 2024) Proceedings, Lecture Notes</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>