{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:38:07Z","timestamp":1755034687978,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":73,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658333058"},{"type":"electronic","value":"9783658333065"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T00:00:00Z","timestamp":1649203200000},"content-version":"vor","delay-in-days":95,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>During interaction with today\u2019s internet services and platform ecosystems, consumer data is often harvested and shared without their consent; that is, consumers seized to be the sovereigns of their own data with the proliferation of the internet. Due to the rapid and abundant nature of interactions in today\u2019s platform ecosystems, manual consent management is impractical. To support development of semi-automated solutions for reestablishing data sovereignty, we investigate the use of policy definition languages as machine-readable and enforceable mechanisms for fostering data sovereignty. We conducted a realist literature review of the capabilities of policy definition languages developed for pertinent application scenarios (e.g., for access control in cloud computing). We consolidate extant literature into a framework of the chances and challenges of leveraging policy definition languages as central building blocks for data sovereignty in platform ecosystems.<\/jats:p>","DOI":"10.1007\/978-3-658-33306-5_22","type":"book-chapter","created":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T08:03:04Z","timestamp":1649145784000},"page":"449-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Let the Computer Say NO! The Neglected Potential of Policy Definition Languages for Data Sovereignty"],"prefix":"10.1007","author":[{"given":"Jan","family":"Bartsch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tobias","family":"Dehling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Florian","family":"Lauf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sven","family":"Meister","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Sunyaev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,4,6]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Binns, R., Lyngs, U., Van Kleek, M., Zhao, J., Libert, T., Shadbolt, N.: Third party tracking in the mobile ecosystem. In: Proceedings of the 10th ACM Conference on Web Science. pp.\u00a023\u201331. ACM, Amsterdam, Netherlands (2018)","DOI":"10.1145\/3201064.3201089"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Libert, T.: An automated approach to auditing disclosure of third-party data collection in website privacy policies. In: Proceedings of the 2018 World Wide Web Conference. pp.\u00a0207\u2013216. International World Wide Web Conferences Steering Committee, Lyon, France (2018)","DOI":"10.1145\/3178876.3186087"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Razaghpanah, A., Nithyanand, R., Vallina-Rodriguez, N., Sundaresan, S., Allman, M., Kreibich, C., Gill, P.: Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem. In: Network and Distributed Systems Security Symposium 2018. NDSS, Sab Duegi, California, USA (2018)","DOI":"10.14722\/ndss.2018.23353"},{"key":"22_CR4","unstructured":"De Filippi, P., McCarthy, S.: Cloud computing: Centralization and data sovereignty. Eur. J. Law Technol. 3 (2012)"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"e28","DOI":"10.1136\/amiajnl-2013-002605","volume":"22","author":"A Sunyaev","year":"2015","unstructured":"Sunyaev, A., Dehling, T., Taylor, P.L., Mandl, K.D.: Availability and quality of mobile health app privacy policies. J. Am. Med. Inform. Assoc. 22, e28\u2013e33 (2015)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1057\/jit.2015.5","volume":"30","author":"S Zuboff","year":"2015","unstructured":"Zuboff, S.: Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology. 30, 75\u201389 (2015)","journal-title":"Journal of Information Technology."},{"key":"22_CR7","unstructured":"Hummel, P., Braun, M., Augsberg, S., Dabrock, P.: Sovereignty and data sharing. ITU Journal: ICT Discoveries. 25, (2018)"},{"key":"22_CR8","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1177\/0162243920928138","volume":"46","author":"C Ochs","year":"2021","unstructured":"Ochs, C., B\u00fcttner, B., Lamla, J.: Trading social visibility for economic amenability: Data-based value Translation on a \u201cHealth and fitness platform.\u201d Sci. Technol. Human Values 46, 480\u2013506 (2021)","journal-title":"Sci. Technol. Human Values"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1177\/1461444819865984","volume":"21","author":"S Couture","year":"2019","unstructured":"Couture, S., Toupin, S.: What does the notion of \u201csovereignty\u201d mean when referring to the digital? New Media & Soc, 21, 2305\u20132322 (2019)","journal-title":"New Media & Society."},{"key":"22_CR11","unstructured":"Polatin-Reuben, D., Wright, J.: An Internet with BRICS Characteristics: Data sovereignty and the balkanisation of the Internet. In: 4th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, San Diego, California, USA (2014)"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1177\/0309132516662147","volume":"42","author":"L Amoore","year":"2018","unstructured":"Amoore, L.: Cloud geographies: Computing, data, sovereignty. Prog. Hum. Geogr. 42, 4\u201324 (2018)","journal-title":"Prog. Hum. Geogr."},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1108\/JEIM-03-2018-0058","volume":"32","author":"J Zrenner","year":"2019","unstructured":"Zrenner, J., Moeller, F.O., Jung, C., Eitel, A., Otto, B.: Usage control architecture options for data sovereignty in business ecosystems. J. Enterp. Inf. Manage. 32, 477\u2013495 (2019)","journal-title":"Journal of Enterprise Information Management."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"848","DOI":"10.17705\/1jais.00554","volume":"20","author":"MJ Culnan","year":"2019","unstructured":"Culnan, M.J.: Policy to avoid a privacy disaster. Journal of the Association for Information Systems. 20, 848\u2013856 (2019)","journal-title":"Journal of the Association for Information Systems."},{"key":"22_CR15","unstructured":"Reinsel, D., Gantz, J., Rydning, J.: The digitization of the world from edge to core. White Paper #US44413318. Framingham: International Data Corporation (2018)."},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.comnet.2011.09.014","volume":"56","author":"W Han","year":"2012","unstructured":"Han, W., Lei, C.: A survey on policy languages in network and security management. Comput. Netw. 56, 477\u2013489 (2012)","journal-title":"Comput. Netw."},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"356","DOI":"10.3390\/info11070356","volume":"11","author":"S Becher","year":"2020","unstructured":"Becher, S., Gerl, A., Meier, B., B\u00f6lz, F.: Big picture on privacy enhancing technologies in e-Health: A holistic personal privacy workflow. Information. 11, 356 (2020)","journal-title":"Information."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering. pp.\u00a01\u201310. ACM, London, England (2014).","DOI":"10.1145\/2601248.2601268"},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.im.2014.08.008","volume":"52","author":"G Par\u00e9","year":"2015","unstructured":"Par\u00e9, G., Trudel, M.-C., Jaana, M., Kitsiou, S.: Synthesizing information systems knowledge: A typology of literature reviews. Information & Management. 52, 183\u2013199 (2015)","journal-title":"Information & Management."},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3, 77\u2013101 (2006)","journal-title":"Qualitative Research in Psychology."},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/65.993218","volume":"16","author":"M Sloman","year":"2002","unstructured":"Sloman, M., Lupu, E.: Security and management policy specification. IEEE Network 16, 10\u201319 (2002)","journal-title":"IEEE Network"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M Sloman","year":"1994","unstructured":"Sloman, M.: Policy driven management for distributed systems. J. Netw. Syst. Manage. 2, 333\u2013360 (1994)","journal-title":"J. Netw. Syst. Manage."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Phan, T., Han, J., Schneider, J.G., Erbinger, T., Rogers, T.: A survey of policy-based management approaches for service oriented systems. In: 19th Australian Conference on Software Engineering. IEEE, Perth, Australia (2008)","DOI":"10.1109\/ASWEC.2008.4483228"},{"key":"22_CR24","unstructured":"Oasis, eXtensible Access Control Markup Language (XACML) Version 3.0, https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html#_Toc325047205. Accessed: 8. 10. 2020"},{"key":"22_CR25","unstructured":"Kumaraguru, P., Cranor, L., Lobo, J., Calo, S.: A survey of privacy policy languages. In: Proceedings of the 3rd symposium on Usable privacy and security. ACM (2007)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, J., Binns, R., Van Kleek, M., Shadbolt, N.: Privacy languages: Are we there yet to enable user controls? In: Proceedings of the 25th International Conference Companion on World Wide Web. pp.\u00a0799\u2013806. ACM, Montr\u00e9al, Qu\u00e9bec, Canada (2016)","DOI":"10.1145\/2872518.2890590"},{"key":"22_CR27","unstructured":"Kasem-Madani, S., Meier, M.: Security and privacy policy languages: A survey, categorization and gap identification. arXiv:1512.00201. (2015)"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Anderson, A.: A comparison of two privacy policy languages: EPAL and XACML. In: Proceedings of the 3rd ACM workshop on secure web services. pp.\u00a053\u201360. ACM, Alexandria, Virginia, USA (2006)","DOI":"10.1145\/1180367.1180378"},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: A survey. Comput. Sci. Rev. 4, 81\u201399 (2010)","journal-title":"Computer Science Review."},{"key":"22_CR30","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: Proceedings Third International Workshop on Policies for Distributed Systems and Networks. pp.\u00a068\u201379. IEEE, Monterey, California, USA, (2002)."},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCSE.2004.22","volume":"6","author":"E Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.: Trust negotiations: concepts, systems, and languages. Comput. Sci. Eng. 6, 27\u201334 (2004)","journal-title":"Computing in science & Engineering."},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Coi, J.D., Olmedilla, D.: A review of trust management, security and privacy policy languages. In: Proceedings of the International Conference on Security and Cryptography. pp.\u00a0483\u2013490. INSTICC PRess, Porto, Portugal (2008)","DOI":"10.5220\/0001921004830490"},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Sci. Am. 284, 34\u201343 (2001)","journal-title":"Sci. Am."},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In: International Semantic Web Conference. pp.\u00a0419\u2013437. Springer, Sanibel Island, Florida, USA (2003)","DOI":"10.1007\/978-3-540-39718-2_27"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Duma, C., Herzog, A., Shahmehri, N.: Privacy in the semantic web: What policy languages have to offer. In: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201907). pp.\u00a0109\u2013118. IEEE, Bologna, Italy (2007)","DOI":"10.1109\/POLICY.2007.39"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Leicht, J., Heisel, M.: A survey on privacy policy languages: Expressiveness concerning data protection regulations. In: 2019 12th CMI Conference on Cybersecurity and Privacy (CMI). pp.\u00a01\u20136. IEEE, Copenhagen, Denmark (2019)","DOI":"10.1109\/CMI48017.2019.8962144"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: International Workshop on Policies for Distributed Systems and Networks. pp.\u00a018\u201338. Springer, Bristol, United Kingdom (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"22_CR38","series-title":"autonomous spontaneous security, and security assurance","first-page":"319","volume-title":"Data privacy management","author":"M Azraoui","year":"2014","unstructured":"Azraoui, M., Elkhiyaoui, K., \u00d6nen, M., Bernsmed, K., De Oliveira, A.S., Sendor, J.: A-PPL: an accountability policy language. In: Data privacy management. autonomous spontaneous security, and security assurance, pp. 319\u2013326. Springer, Wroclaw, Poland (2014)"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Adonis, A.A.: Critical engagement on digital sovereignty in international relations: Actor transformation and global hierarchy. Glob. J. Polit. Int. 21, 262\u2013282 (2019)","DOI":"10.7454\/global.v21i2.412"},{"key":"22_CR40","unstructured":"Otto, B., Auer, S., Cirullies, J., J\u00fcrjens, J., Menz, N., Schon, J., Wenzel, S.: Industrial Data Space Digitale Souver\u00e4nit\u00e4t \u00fcber Daten. Fraunhofer-Gesellschaft zur F\u00f6rderung der angewandten Forschung e.\u00a0V und Industrial Data Space e.\u00a0V. (2016)"},{"key":"22_CR41","doi-asserted-by":"crossref","unstructured":"Posch, R.: Digital sovereignty and IT-security for a prosperous society. In: Informatics in the Future. pp.\u00a077\u201386. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-55735-9_7"},{"key":"22_CR42","unstructured":"Harzing, A.-W.: Publish or perish. https:\/\/harzing.com\/resources\/publish-or-perish. Zugegriffen: 27. Mai. 2020"},{"key":"22_CR43","first-page":"13","volume":"26","author":"J Webster","year":"2002","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: Writing a literature review. MIS Q. 26, 13\u201323 (2002)","journal-title":"MIS Quarterly."},{"key":"22_CR44","doi-asserted-by":"crossref","unstructured":"Henze, M., Hiller, J., Schmerling, S., Ziegeldorf, J.H., Wehrle, K.: Cppl: Compact privacy policy language. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. pp.\u00a099\u2013110. ACM, New York, NY, USA (2016)","DOI":"10.1145\/2994620.2994627"},{"key":"22_CR45","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/293411.293455","volume":"42","author":"J Reagle","year":"1999","unstructured":"Reagle, J., Cranor, L.F.: The platform for privacy preferences. Commun. ACM 42, 48\u201355 (1999)","journal-title":"Commun. ACM"},{"key":"22_CR46","doi-asserted-by":"crossref","unstructured":"van de Ven, J., Dylla, F.: Qualitative privacy description language. In: Annual Privacy Forum. pp.\u00a0171\u2013189. Springer, Frankfurt a.\u00a0M. (2016)","DOI":"10.1007\/978-3-319-44760-5_11"},{"key":"22_CR47","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-662-57932-9_2","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII","author":"A Gerl","year":"2018","unstructured":"Gerl, A., Bennani, N., Kosch, H., Brunie, L.: LPL, towards a GDPR-compliant privacy language: Formal definition and usage. In: Hameurlain, A., Wagner, R. (Hrsg.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII, pp.\u00a041\u201380. Springer, Berlin (2018)"},{"key":"22_CR48","unstructured":"Benghabrit, W., Grall, H., Royer, J.-C., Sellami, M., Azraoui, M., Elkhiyaoui, K., \u00d6nen, M., De Oliveira, A.S., Bernsmed, K.: A Cloud Accountability Policy Representation Framework. In: Proceedings of the 4th International Conference on Cloud Computing and Services Science. pp.\u00a0489\u2013498. SCITEPRESS, Barcelona, Spain (2014)."},{"key":"22_CR49","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.infsof.2008.04.004","volume":"51","author":"P Guarda","year":"2009","unstructured":"Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51, 337\u2013350 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"22_CR50","doi-asserted-by":"crossref","unstructured":"Ulbricht, M.-R., Pallas, F.: YaPPL-a lightweight privacy preference language for legally sufficient and automated consent provision in IoT scenarios. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology. pp.\u00a0329\u2013344. Springer (2018)","DOI":"10.1007\/978-3-030-00305-0_23"},{"key":"22_CR51","volume-title":"S4P: A generic language for specifying privacy preferences and policies","author":"MY Becker","year":"2010","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: S4P: A generic language for specifying privacy preferences and policies. Technical Report, Microsoft Research (2010)"},{"key":"22_CR52","doi-asserted-by":"crossref","unstructured":"Jiang, H., Bouabdallah, A.: JACPoL: a simple but expressive JSON-based access control policy language. In: IFIP International Conference on Information Security Theory and Practice. pp.\u00a056\u201372. Springer, Crete, Greece (2017)","DOI":"10.1007\/978-3-319-93524-9_4"},{"key":"22_CR53","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J.M., Jeffers, R., Tate, A., Dalton, J.: Applying KAoS services to ensure policy compliance for semantic web services workflow composition and enactment. In: The Semantic Web\u2013ISWC 2004. pp.\u00a0425\u2013440. Springer, Hiroshima, Japan (2004)","DOI":"10.1007\/978-3-540-30475-3_30"},{"key":"22_CR54","unstructured":"Morel, V., Pardo, R.: Three dimensions of privacy policies. arXiv preprint arXiv:1908.06814. (2019)"},{"key":"22_CR55","doi-asserted-by":"crossref","unstructured":"Li, N., Chen, H., Bertino, E.: On practical specification and enforcement of obligations. In: Proceedings of the second ACM conference on Data and Application Security and Privacy. pp.\u00a071\u201382. ACM, San Antonio, Texas, USA (2012)","DOI":"10.1145\/2133601.2133611"},{"key":"22_CR56","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic web policies\u2013a discussion of requirements and research issues. In: ESWC 2006: The Semantic Web: Research and Applications. pp.\u00a0712\u2013724. Springer, Budva, Montenegro (2006)","DOI":"10.1007\/11762256_51"},{"key":"22_CR57","doi-asserted-by":"crossref","unstructured":"Ferguson, D., Albright, Y., Lomsak, D., Hanks, T., Orr, K., Ligatti, J.: PoCo: A Language for specifying obligation-based policy compositions. In: Proceedings of the 2020 9th International Conference on Software and Computer Applications. pp.\u00a0331\u2013338. ACM, Langkawi, Malaysia (2020)","DOI":"10.1145\/3384544.3384585"},{"key":"22_CR58","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Olmedilla, D.: Rule-based policy representation and reasoning for the semantic web. In: Reasoning Web 2007: Reasoning Web. pp.\u00a0240\u2013268. Springer, Dresden, Germany (2007)","DOI":"10.1007\/978-3-540-74615-7_4"},{"key":"22_CR59","first-page":"17","volume-title":"Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security","author":"R Sandhu","year":"2003","unstructured":"Sandhu, R., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L., Skormin, V. (Eds.) Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 17\u201331. Springer, St. Petersburg, Russia (2003)"},{"key":"22_CR60","doi-asserted-by":"crossref","unstructured":"Gil, G., Arnaiz, A., Diez, F.J., Higuero, M.V.: Evaluation methodology for distributed data usage control solutions. In: 2020 Global Internet of Things Summit. pp.\u00a01\u20136. IEEE, Dublin, Ireland (2020)","DOI":"10.1109\/GIOTS49054.2020.9119565"},{"key":"22_CR61","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-540-74835-9_35","volume-title":"Computer Security \u2013 ESORICS 2007","author":"M Hilty","year":"2007","unstructured":"Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., L\u00f3pez, J. (Hrsg.) Computer Security \u2013 ESORICS 2007, pp. 531\u2013546. Springer, Dresden, Germany (2007)"},{"key":"22_CR62","doi-asserted-by":"crossref","unstructured":"Bier, C.: How usage control and provenance tracking get together - a data protection perspective. In: 2013 IEEE Security and Privacy Workshops. pp.\u00a013\u201317. IEEE, San Francisco, California, USA (2013)","DOI":"10.1109\/SPW.2013.24"},{"key":"22_CR63","series-title":"Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","first-page":"289","volume-title":"2018 17th IEEE International Conference On Trust","author":"J Schuette","year":"2018","unstructured":"Schuette, J., Brost, G.S.: LUCON: Data flow control for message-based IoT systems. In: 2018 17th IEEE International Conference On Trust. Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 289\u2013299. IEEE, New York, NY, USA (2018)"},{"key":"22_CR64","unstructured":"Otto, B., Steinbu\u00df, S., Teuscher, A., Lohmann, S., et. al.: IDS reference architecture model version 3.0. International Data Spaces Association (2019)"},{"key":"22_CR65","doi-asserted-by":"crossref","unstructured":"Karafili, E., Lupu, E.C.: Enabling data sharing in contextual environments: Policy representation and analysis. In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. pp.\u00a0231\u2013238. ACM, Indianapolis, Indiana, USA (2017)","DOI":"10.1145\/3078861.3078876"},{"key":"22_CR66","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A Pretschner","year":"2006","unstructured":"Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Commun. ACM 49, 39\u201344 (2006)","journal-title":"Commun. ACM"},{"key":"22_CR67","doi-asserted-by":"crossref","unstructured":"Kolar, M., Fernandez-Gago, C., Lopez, J.: Policy languages and their suitability for trust negotiation. In: DBSec 2018: Data and Applications Security and Privacy XXXII. pp.\u00a069\u201384. Springer, Bergamo, Italy (2018)","DOI":"10.1007\/978-3-319-95729-6_5"},{"key":"22_CR68","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"LF Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction. 13, 135\u2013178 (2006)","journal-title":"ACM Transactions on Computer-Human Interaction."},{"key":"22_CR69","unstructured":"Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: 14th International Workshop on Database and Expert Systems Applications. pp.\u00a0377\u2013382. IEEE, Prague, Czech Republic (2003)"},{"key":"22_CR70","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: PET 2002: Privacy Enhancing Technologies. pp.\u00a069\u201384. Springer, San Francisco, California, USA (2002)","DOI":"10.1007\/3-540-36467-6_6"},{"key":"22_CR71","doi-asserted-by":"crossref","unstructured":"Kapitsaki, G.M.: Reflecting user privacy preferences in context-aware web services. In: 2013 IEEE 20th International Conference on Web Services. pp.\u00a0123\u2013130. IEEE, Santa Clara, California, USA (2013)","DOI":"10.1109\/ICWS.2013.26"},{"key":"22_CR72","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-030-34957-8_9","volume-title":"Internet computing: Principles of distributed systems and emerging internet-based technologies","author":"A Sunyaev","year":"2020","unstructured":"Sunyaev, A.: Distributed ledger technology. In: Sunyaev, A. (Hrsg.) Internet computing: Principles of distributed systems and emerging internet-based technologies, pp. 265\u2013299. Springer International Publishing, Cham (2020)"},{"key":"22_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3379463","volume":"53","author":"N Kannengie\u00dfer","year":"2020","unstructured":"Kannengie\u00dfer, N., Lins, S., Dehling, T., Sunyaev, A.: Trade-offs between distributed ledger technology characteristics. ACM Comput. Surv. 53, 42:1\u201337 (2020)","journal-title":"ACM Comput. Surv."}],"container-title":["DuD-Fachbeitr\u00e4ge","Selbstbestimmung, Privatheit und Datenschutz"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-33306-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T16:03:36Z","timestamp":1726934616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-33306-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783658333058","9783658333065"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-33306-5_22","relation":{},"ISSN":["2512-6997","2512-7004"],"issn-type":[{"type":"print","value":"2512-6997"},{"type":"electronic","value":"2512-7004"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}