{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:15:35Z","timestamp":1773317735438,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031945779","type":"print"},{"value":"9783031945786","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94578-6_11","type":"book-chapter","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:15:35Z","timestamp":1748582135000},"page":"192-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Interoperable Interpretation and\u00a0Evaluation of\u00a0ODRL Policies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3287-7312","authenticated-orcid":false,"given":"Wout","family":"Slabbinck","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6645-1264","authenticated-orcid":false,"given":"Juli\u00e1n","family":"Rojas Mel\u00e9ndez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0259-7560","authenticated-orcid":false,"given":"Beatriz","family":"Esteves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6917-2167","authenticated-orcid":false,"given":"Pieter","family":"Colpaert","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8596-222X","authenticated-orcid":false,"given":"Ruben","family":"Verborgh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,31]]},"reference":[{"key":"11_CR1","unstructured":"eXtensible Access Control Markup Language (XACML) v3.0 (2013). https:\/\/www.oasis-open.org\/standard\/xacmlv3-0\/"},{"key":"11_CR2","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance) (2016). http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj\/eng. Legislative Body: EP, CONSIL"},{"key":"11_CR3","unstructured":"Regulation - 2019\/2144 - EN - EUR-Lex (2019). https:\/\/eur-lex.europa.eu\/eli\/reg\/2019\/2144\/oj\/eng. doc ID: 32019R2144 Doc Sector: 3 Doc Title: Regulation (EU) 2019\/2144 of the European Parliament and of the Council of 27 November 2019 on type-approval requirements for motor vehicles and their trailers, and systems, components and separate technical units intended for such vehicles, as regards their general safety and the protection of vehicle occupants and vulnerable road users, amending Regulation (EU) 2018\/858 of the European Parliament and of the Council and repealing Regulations (EC) No 78\/2009, (EC) No 79\/2009 and (EC) No 661\/2009 of the European Parliament and of the Council and Commission Regulations (EC) No 631\/2009, (EU) No 406\/2010, (EU) No 672\/2010, (EU) No 1003\/2010, (EU) No 1005\/2010, (EU) No 1008\/2010, (EU) No 1009\/2010, (EU) No 19\/2011, (EU) No 109\/2011, (EU) No 458\/2011, (EU) No 65\/2012, (EU) No 130\/2012, (EU) No 347\/2012, (EU) No 351\/2012, (EU) No 1230\/2012 and (EU) 2015\/166 (Text with EEA relevance) Doc Type: R Usr_lan: en"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Akaichi, I., Flouris, G., Fundulaki, I., Kirrane, S.: GUCON: a generic graph pattern based policy framework for usage control enforcement. In: Fensel, A., Ozaki, A., Roman, D., Soylu, A. (eds.) Rules and Reasoning. LNCS, vol. 14244, pp. 34\u201353. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-45072-3_3","DOI":"10.1007\/978-3-031-45072-3_3"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Akaichi, I., Kirrane, S.: Usage Control Specification, Enforcement, and Robustness: A Survey (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.04800. http:\/\/arxiv.org\/abs\/2203.04800. arXiv:2203.04800","DOI":"10.48550\/arXiv.2203.04800"},{"key":"11_CR6","unstructured":"Akaichi, I., et al.: Interoperable and continuous usage control enforcement in dataspaces. In: Theissen-Lipp, J., Colpaert, P., Sowe, S.K., Curry, E., Decker, S. (eds.) Proceedings of the Second International Workshop on Semantics in Dataspaces (SDS 2024). CEUR Workshop Proceedings, vol.\u00a03705. CEUR, Hersonissos, Greece (2024). https:\/\/ceur-ws.org\/Vol-3705\/#paper10. ISSN: 1613-0073"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Cailliau, R., Groff, J.F., Pollermann, B.: World-wide web: the information universe. Internet Res. 2(1), 52\u201358 (1992). https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/eb047254\/full\/html","DOI":"10.1108\/eb047254"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s13218-020-00677-4","volume":"34","author":"PA Bonatti","year":"2020","unstructured":"Bonatti, P.A., Kirrane, S., Petrova, I.M., Sauro, L.: Machine understandable policies and GDPR compliance checking. KI - K\u00fcnstliche Intelligenz 34(3), 303\u2013315 (2020). https:\/\/doi.org\/10.1007\/s13218-020-00677-4","journal-title":"KI - K\u00fcnstliche Intelligenz"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Cimmino, A., Cano-Benito, J., Garc\u00eda-Castro, R.: Open digital rights enforcement framework (ODRE): from descriptive to enforceable policies. Comput. Secur. 150(C) (2025). https:\/\/doi.org\/10.1016\/j.cose.2024.104282","DOI":"10.1016\/j.cose.2024.104282"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Colombo, M., Lazouski, A., Martinelli, F., Mori, P.: A proposal on enhancing XACML with continuous usage control features. In: Desprez, F., Getov, V., Priol, T., Yahyapour, R. (eds.) Grids, P2P and Services Computing, pp. 133\u2013146. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6794-7_11","DOI":"10.1007\/978-1-4419-6794-7_11"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"De\u00a0Vos, M., Kirrane, S., Padget, J., Satoh, K.: ODRL policy modelling and compliance checking. In: Rules and Reasoning: Third International Joint Conference, RuleML+ RR 2019, Bolzano, Italy, 16\u201319 September 2019, Proceedings 3, pp. 36\u201351. Springer (2019)","DOI":"10.1007\/978-3-030-31095-0_3"},{"key":"11_CR12","unstructured":"Drees, H., Kubitza, D.O., Lipp, J., Pretzsch, S., Langdon, C.S.: Mobility data space\u2013first implementation and business opportunities. In: ITS World Congress (2021). https:\/\/www.researchgate.net\/profile\/Johannes-Theissen-Lipp\/publication\/351519610_Mobility_Data_Space_-_First_Implementation_and_Business_Opportunities\/links\/610101882bf3553b29174ee6\/Mobility-Data-Space-First-Implementation-and-Business-Opportunities.pdf"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Esteves, B., Rodr\u00edguez-Doncel, V., Pandit, H.J., Mondada, N., McBennett, P.: Using the ODRL profile for access control for solid pod resource governance. In: European Semantic Web Conference, pp. 16\u201320. Springer (2022)","DOI":"10.1007\/978-3-031-11609-4_3"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Fornara, N., Colombetti, M.: Using semantic web technologies and production rules for reasoning on obligations, permissions, and prohibitions. AI Commun. 32(4), 319\u2013334 (2019). https:\/\/content.iospress.com\/articles\/ai-communications\/aic190617","DOI":"10.3233\/AIC-190617"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. Request for Comments RFC 6749, Internet Engineering Task Force, num Pages: 76 (2012). https:\/\/doi.org\/10.17487\/RFC6749. https:\/\/datatracker.ietf.org\/doc\/rfc6749","DOI":"10.17487\/RFC6749"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Hosseinzadeh, A., Eitel, A., Jung, C.: A systematic approach toward extracting technically enforceable policies from data usage control requirements. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy, pp. 397\u2013405. SCITEPRESS - Science and Technology Publications, Valletta, Malta (2020). https:\/\/doi.org\/10.5220\/0008936003970405. http:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0008936003970405","DOI":"10.5220\/0008936003970405"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"J.\u00a0Pandit, H., Esteves, B., P.\u00a0Krog, G., Ryan, P., Golpayegani, D., Flake, J.: Data privacy vocabulary (DPV) \u2013 version 2.0. In: Demartini, G., et al. (eds.) The Semantic Web \u2013 ISWC 2024. LNCS, vol. 15233, pp. 171\u2013193. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-77847-6_10","DOI":"10.1007\/978-3-031-77847-6_10"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Kebede, M.G., Sileno, G., Van\u00a0Engers, T.: A critical reflection on ODRL. In: International Workshop on AI Approaches to the Complexity of Legal Systems, pp. 48\u201361. Springer (2018)","DOI":"10.1007\/978-3-030-89811-3_4"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Kirrane, S., Mileo, A., Decker, S.: Access control and the resource description framework: a survey. Semant. Web 8(2), 311\u2013352 (2017). https:\/\/doi.org\/10.3233\/SW-160236","DOI":"10.3233\/SW-160236"},{"key":"11_CR20","unstructured":"Knublauch, H., Kontokostas, D.: Shapes constraint language (SHACL). W3C Recommendation 11(8), 1 (2017). https:\/\/www.w3.org\/TR\/shacl\/"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Nagel, L., Lycklama, D.: Design Principles for Data Spaces - Position Paper. Technical report, Zenodo (2021). https:\/\/doi.org\/10.5281\/zenodo.5105744. https:\/\/zenodo.org\/records\/5105744","DOI":"10.5281\/zenodo.5105744"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Nielsen, H., Fielding, R.T., Berners-Lee, T.: Hypertext Transfer Protocol \u2013 HTTP\/1.0. Request for Comments RFC 1945, Internet Engineering Task Force, num Pages: 60 (1996). https:\/\/doi.org\/10.17487\/RFC1945. https:\/\/datatracker.ietf.org\/doc\/rfc1945","DOI":"10.17487\/RFC1945"},{"issue":"1","key":"11_CR23","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004). https:\/\/doi.org\/10.1145\/984334.984339","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"11_CR24","doi-asserted-by":"publisher","unstructured":"Pretschner, A., Hilty, M., Sch\u00fctz, F., Schaefer, C., Walter, T.: Usage control enforcement: present and future. IEEE Secur. Priv. Mag. 6(4), 44\u201353 (2008). https:\/\/doi.org\/10.1109\/MSP.2008.101. http:\/\/ieeexplore.ieee.org\/document\/4588229\/","DOI":"10.1109\/MSP.2008.101"},{"key":"11_CR25","unstructured":"Siska, V., Karagiannis, V., Drobics, M.: Building a Dataspace: Technical Overview (2023). https:\/\/www.gaia-x.at\/wp-content\/uploads\/2023\/04\/WhitepaperGaiaX.pdf"},{"key":"11_CR26","unstructured":"Slabbinck, W., Rojas\u00a0Mel\u00e9ndez, J.A., Esteves, B., Verborgh, R., Colpaert, P.: Enforcing usage control policies in solid using a rule-based software agent. In: Proceedings of the Second Solid Symposium (2024)"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-319-21542-6_23","volume-title":"Rule Technologies: Foundations, Tools, and Applications","author":"S Steyskal","year":"2015","unstructured":"Steyskal, S., Polleres, A.: Towards formal semantics for ODRL policies. In: Bassiliades, N., Gottlob, G., Sadri, F., Paschke, A., Roman, D. (eds.) RuleML 2015. LNCS, vol. 9202, pp. 360\u2013375. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21542-6_23"},{"key":"11_CR28","unstructured":"Tim Berners-Lee: Notation 3 Logic (1998). https:\/\/www.w3.org\/DesignIssues\/Notation3.html"},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Verborgh, R.: Re-decentralizing the web, for good this time. In: Seneviratne, O., Hendler, J. (eds.) Linking the World\u2019s Information: Essays on Tim Berners-Lee\u2019s Invention of the World Wide Web, pp. 215\u2013230. ACM (2023). https:\/\/doi.org\/10.1145\/3591366.3591385. https:\/\/ruben.verborgh.org\/articles\/redecentralizing-the-web\/","DOI":"10.1145\/3591366.3591385"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Verborgh, R., De Roo, J.: Drawing conclusions from linked data on the web: the EYE reasoner. IEEE Softw. 32(3), 23\u201327 (2015). https:\/\/doi.org\/10.1109\/MS.2015.63. http:\/\/ieeexplore.ieee.org\/document\/7093047\/","DOI":"10.1109\/MS.2015.63"},{"key":"11_CR31","unstructured":"W3C Working Group: The Open Digital Rights Language (ODRL) (2018). https:\/\/www.w3.org\/TR\/odrl-model\/"},{"key":"11_CR32","unstructured":"Wright, J., Roo, J.D., Smessaert, I.: EYE JS: a client-side reasoning engine supporting Notation3 and RDF Surfaces. In: Etcheverry, L., Garcia, V.L., Osborne, F., Pernisch, R. (eds.) Proceedings of the ISWC 2024 Posters, Demos and Industry Tracks: From Novel Ideas to Industrial Practice. CEUR Workshop Proceedings, vol.\u00a03828. CEUR, Maryland, USA (2024). https:\/\/ceur-ws.org\/Vol-3828\/#ISWC2024_paper_8. ISSN: 1613-0073"},{"key":"11_CR33","doi-asserted-by":"publisher","unstructured":"Zhao, R., Zhao, J.: Perennial semantic data terms of use for decentralized web. In: Proceedings of the ACM Web Conference 2024, Singapore, Singapore, pp. 2238\u20132249. ACM (2024). https:\/\/doi.org\/10.1145\/3589334.3645631. https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645631","DOI":"10.1145\/3589334.3645631"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94578-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:02:57Z","timestamp":1748642577000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94578-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031945779","9783031945786"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94578-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESWC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Semantic Web Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portoroz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esws2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.eswc-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}