{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T10:44:24Z","timestamp":1773312264563,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006387","type":"print"},{"value":"9783032006394","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00639-4_8","type":"book-chapter","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T10:40:53Z","timestamp":1754908853000},"page":"130-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identity and\u00a0Access Management for\u00a0Dataspaces Using the\u00a0European Business Wallet and\u00a0eIDAS-Based Credentials"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1180-1570","authenticated-orcid":false,"given":"Tobias","family":"Wich","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0316-7936","authenticated-orcid":false,"given":"Detlef","family":"H\u00fchnlein","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0634-6563","authenticated-orcid":false,"given":"Tina","family":"H\u00fchnlein","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2679-3699","authenticated-orcid":false,"given":"Mike","family":"Prechtl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2880-1719","authenticated-orcid":false,"given":"Michael","family":"Rauh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1328-4092","authenticated-orcid":false,"given":"Neil","family":"Crossley","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9939-072X","authenticated-orcid":false,"given":"Florian","family":"Otto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7549-2746","authenticated-orcid":false,"given":"Marina","family":"Artis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,10]]},"reference":[{"key":"8_CR1","unstructured":"Albertoni, R., Browning, D., Cox, S.J.D., Beltran, A.G., Perego, A., Winstanley, P.: Data catalog vocabulary (DCAT) - version 3. W3C Recommendation (2024). https:\/\/www.w3.org\/TR\/vocab-dcat-3\/"},{"key":"8_CR2","unstructured":"Bertagnolli, A., et al.: Eclipse decentralized claims protocol v1.0-RC3, March 2025. https:\/\/eclipse-dataspace-dcp.github.io\/decentralized-claims-protocol\/v1.0-RC3\/"},{"key":"8_CR3","unstructured":"Bertocci, V.: JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens. IETF RFC 9068. https:\/\/www.rfc-editor.org\/rfc\/rfc9068"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A., Stebila, D.: Protocols for Authentication and Key Establishment. Springer (2020)","DOI":"10.1007\/978-3-662-58146-9"},{"key":"8_CR5","unstructured":"Campbell, B., Mortimore, C., Jones, M.: Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants. IETF RFC 7522. https:\/\/www.rfc-editor.org\/rfc\/rfc7522.html"},{"key":"8_CR6","unstructured":"Campbell, B., Mortimore, C., Jones, M., Goland, Y.: Assertion framework for OAuth 2.0 client authentication and authorization grants. IETF RFC 7521. https:\/\/www.rfc-editor.org\/rfc\/rfc7521.html"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF RFC 5280 (2008). https:\/\/www.rfc-editor.org\/rfc\/rfc5280","DOI":"10.17487\/rfc5280"},{"key":"8_CR8","unstructured":"DID: Web Method Specification. Unofficial Draft, 31 July 2024. https:\/\/w3c-ccg.github.io\/did-method-web\/"},{"key":"8_CR9","unstructured":"ETSI TS 119 411-8: Electronic Signatures and Infrastructures (ESI); Trust Service Providers issuing certificates; Part 8: Common Access Certificate Policy for EUDI Wallet Relying Parties. Draft (2025). https:\/\/portal.etsi.org\/webapp\/WorkProgram\/Report_WorkItem.asp?WKI_ID=74431"},{"key":"8_CR10","unstructured":"European Commission presents its compass to boost Europe\u2019s competitiveness in the next five years (2025). https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ac_25_385"},{"key":"8_CR11","unstructured":"European Commission: Competitiveness Compass for the EU. Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions (2025). https:\/\/commission.europa.eu\/document\/download\/10017eb1-4722-4333-add2-e0ed18105a34_en"},{"key":"8_CR12","unstructured":"European Digital Identity Wallet Consortium: Architecture and Reference Framework (ARF) (2025). https:\/\/eu-digital-identity-wallet.github.io\/eudi-doc-architecture-and-reference-framework\/2.1.0\/architecture-and-reference-framework-main\/"},{"key":"8_CR13","unstructured":"Fett, D., Campbell, B., Bradley, J., Lodderstedt, T., Jones, M., Waite, D.: OAuth 2.0 Demonstrating Proof of Possession (DPoP). IETF RFC 9449. https:\/\/datatracker.ietf.org\/doc\/html\/rfc9449"},{"key":"8_CR14","unstructured":"Fielding, R., Nottingham, M., Reschke, J.: HTTP Semantics. IETF RFC 9110. https:\/\/www.rfc-editor.org\/rfc\/rfc9110"},{"key":"8_CR15","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. IETF RFC 6749. https:\/\/www.rfc-editor.org\/rfc\/rfc6749"},{"key":"8_CR16","unstructured":"Hedberg, R., Jones, M., Solberg, A., Bradley, J., Marco, G.D., Dzhuvinov, V.: OpenID Federation 1.0 - draft 42 (2025). https:\/\/openid.net\/specs\/openid-federation-1_0.html"},{"key":"8_CR17","unstructured":"H\u00fchnlein, T., H\u00fchnlein, D., St\u00f6cker, C., Schwalm, S.: Towards the European Business Wallet. Proceedings of Open Identity Summit 2025 (2025). https:\/\/dl.gi.de\/items\/c1d7ff4a-374a-4c11-a81e-64c5cc607e04"},{"key":"8_CR18","unstructured":"Iannella, R., Villata, S.: ODRL Information Model 2.2. W3C Recommendation (2018). https:\/\/www.w3.org\/TR\/odrl-model\/"},{"key":"8_CR19","unstructured":"International Data Spaces Association: Dataspace Protocol 2024-1 (2024). https:\/\/docs.internationaldataspaces.org\/ids-knowledgebase\/dataspace-protocol"},{"key":"8_CR20","unstructured":"ISO\/IEC: Information technology\u2014Open Systems Interconnection\u2014Basic Reference Model: The Basic Model. ISO\/IEC 7498-1 (1994)"},{"key":"8_CR21","unstructured":"ISO\/IEC: Information technology\u2014Cloud computing and distributed platforms\u2014Dataspace concepts and characteristics. ISO\/IEC DIS 20151 (2025)"},{"key":"8_CR22","unstructured":"ITU-T: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks. Recommendation X.509 (2019). https:\/\/www.itu.int\/rec\/T-REC-X.509-201910-I\/en"},{"key":"8_CR23","unstructured":"Jones, M.: JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants. IETF RFC 7523. https:\/\/www.rfc-editor.org\/rfc\/rfc7523.html"},{"key":"8_CR24","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON Web Signature (JWS). IETF RFC 7515. https:\/\/www.rfc-editor.org\/rfc\/rfc7515"},{"key":"8_CR25","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON Web Token (JWT). IETF RFC 7519. https:\/\/www.rfc-editor.org\/rfc\/rfc7519"},{"key":"8_CR26","unstructured":"Jones, M., Hardt, D.: The OAuth 2.0 Authorization Framework: Bearer Token Usage. IETF RFC 6750. https:\/\/www.rfc-editor.org\/rfc\/rfc6750"},{"key":"8_CR27","unstructured":"Koen, P., Jahromi, B.G., Dingle, P., von\u00a0der Wiele, S.M., Marino, J., Latzelsberger, P.: Decentralized attribute-based access control. US patent, US20230388287A1, December 2024. https:\/\/patents.google.com\/patent\/US20230388287A1\/en"},{"key":"8_CR28","unstructured":"Koen, P., Kollenstart, M., Marino, J., Pampus, J., Turkmayali, A., Steinbuss, S.: Dataspace Protocol 2025-1-RC1, February 2025. https:\/\/eclipse-dataspace-protocol-base.github.io\/DataspaceProtocol\/2025-1-RC1\/"},{"key":"8_CR29","unstructured":"Lodderstedt, T.E., McGloin, M., Hunt, P.: OAuth 2.0 Threat Model and Security Considerations. IETF RFC 6819. https:\/\/www.rfc-editor.org\/rfc\/rfc6819"},{"key":"8_CR30","unstructured":"Lodderstedt, T., Bradley, J., Labunets, A., Fett, D.: Best current practice for OAuth 2.0 security. IETF RFC 9700. https:\/\/datatracker.ietf.org\/doc\/html\/rfc9700"},{"key":"8_CR31","unstructured":"Lodderstedt, T., Yasuda, K., Looker, T.: OpenID for Verifiable Credential Issuance (2024). https:\/\/openid.net\/specs\/openid-4-verifiable-credential-issuance-1_0.html"},{"key":"8_CR32","unstructured":"Looker, T., Bastian, P., Bormann, C.: OAuth 2.0 Attestation-Based Client Authentication. IETF Draft draft-ietf-oauth-attestation-based-client-auth-05 (2025). https:\/\/www.ietf.org\/archive\/id\/draft-ietf-oauth-attestation-based-client-auth-05.html"},{"issue":"2\/3","key":"8_CR33","first-page":"156","volume":"18","author":"A Mohamed","year":"2022","unstructured":"Mohamed, A., Auer, D., Hofer, D., K\u00fcng, J.: A systematic literature review for authorization and access control: definitions, strategies and models. Int. J. Web Inf. Syst. 18(2\/3), 156\u2013180 (2022)","journal-title":"Int. J. Web Inf. Syst."},{"key":"8_CR34","unstructured":"OASIS: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard (2005). https:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf"},{"key":"8_CR35","unstructured":"Shekh-Yusef, E., Ahrens, D., Bremer, S.: HTTP Digest Access Authentication. IETF RFC 7616. https:\/\/www.rfc-editor.org\/rfc\/rfc7616"},{"key":"8_CR36","unstructured":"Reschke, J.: The \u2018Basic\u2019 HTTP Authentication Scheme. IETF RFC 7617. https:\/\/www.rfc-editor.org\/rfc\/rfc7617"},{"key":"8_CR37","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. IETF RFC 8446. https:\/\/www.rfc-editor.org\/rfc\/rfc8446"},{"key":"8_CR38","unstructured":"Richer, J.: OAuth 2.0 Token Introspection. IETF RFC 7662. https:\/\/www.rfc-editor.org\/rfc\/rfc7662"},{"key":"8_CR39","unstructured":"Sporny, M., Longley, D., Chadwick, D.: Verifiable Credentials Data Model v1.1 (2022). https:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"8_CR40","unstructured":"Sporny, M., Longley, D., Sabadello, M., Reed, D., Steel, O., Allen, C.: Decentralized Identifiers (DIDs) v1.0 (2022). https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"8_CR41","unstructured":"Terbu, O., Lodderstedt, T., Yasuda, K., Looker, T.: OpenID for Verifiable Presentations (2025). https:\/\/openid.net\/specs\/openid-4-verifiable-presentations-1_0.html"},{"key":"8_CR42","unstructured":"W3C: DID Methods. W3C Group Note (2025). https:\/\/www.w3.org\/TR\/did-extensions-methods\/"},{"key":"8_CR43","unstructured":"Yasuda, K., Jones, M., Lodderstedt, T.: Self-Issued OpenID Provider V2 - draft 13 (2023). https:\/\/openid.net\/specs\/openid-connect-self-issued-v2-1_0.html"},{"key":"8_CR44","unstructured":"Yasuda, K., Lodderstedt, T.: OpenID4VC High Assurance Interoperability Profile - draft 03 (2025). https:\/\/openid.net\/specs\/openid4vc-high-assurance-interoperability-profile-1_0-03.html"},{"key":"8_CR45","unstructured":"You, J., Wu, J., Jin, X.X., Chowdhury, M.: Ship compute or ship data? Why not both? In: Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 12\u201314 April 2021"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00639-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:17:25Z","timestamp":1773245845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00639-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006387","9783032006394"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00639-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}