{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:06:55Z","timestamp":1778789215991,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819635306","type":"print"},{"value":"9789819635313","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_7","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:10:53Z","timestamp":1741867853000},"page":"127-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Decentralized Data Usage Control with\u00a0Confidential Data Processing on\u00a0Trusted Execution Environment and\u00a0Distributed Ledger Technology"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7207-4433","authenticated-orcid":false,"given":"Shota","family":"Tokuda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3137-4956","authenticated-orcid":false,"given":"Shohei","family":"Kakei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8970-9408","authenticated-orcid":false,"given":"Yoshiaki","family":"Shiraishi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3103-9656","authenticated-orcid":false,"given":"Shoichi","family":"Saito","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Ayoade, G., Karande, V., Khan, L., Hamlen, K.: Decentralized IoT data management using blockchain and trusted execution environment. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI), pp. 15\u201322 (2018). https:\/\/doi.org\/10.1109\/IRI.2018.00011","DOI":"10.1109\/IRI.2018.00011"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Basile, D., Di\u00a0Ciccio, C., Goretti, V., Kirrane, S.: A blockchain-driven architecture for usage control in solid. In: 2023 IEEE 43rd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 19\u201324 (2023). https:\/\/doi.org\/10.1109\/ICDCSW60045.2023.00009","DOI":"10.1109\/ICDCSW60045.2023.00009"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Basile, D., Di\u00a0Ciccio, C., Goretti, V., Kirrane, S.: Blockchain based Resource Governance for Decentralized Web Environments. Front. Blockchain 6 (2023). https:\/\/doi.org\/10.3389\/fbloc.2023.1141909","DOI":"10.3389\/fbloc.2023.1141909"},{"key":"7_CR4","unstructured":"Eitel, A., et al.: Usage Control in the International Data Spaces. Aufl. IDS Association, Berlin (2021)"},{"key":"7_CR5","unstructured":"European Union: General Data Protection Regulation (GDPR) \u2013 Official Legal Text. https:\/\/gdpr-info.eu\/ (2016), (Accessed 01 Mar 2024)"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Felde, H.M.Z., Morbitzer, M., Sch\u00fctte, J.: Securing remote policy enforcement by a multi-enclave based attestation architecture. In: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 102\u2013108 (2021). https:\/\/doi.org\/10.1109\/EUC53437.2021.00023","DOI":"10.1109\/EUC53437.2021.00023"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Felde, H.M.Z., Reding, J.L., Lux, M.: D-GATE: decentralized geolocation and time enforcement for usage control. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 386\u2013395 (2023). https:\/\/doi.org\/10.1109\/EuroSPW59978.2023.00049","DOI":"10.1109\/EuroSPW59978.2023.00049"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Havur, G., Vander Sande, M., Kirrane, S.: Greater control and transparency in personal data processing. In: Furnell , S., Mori, P., Weippl, E., Camp, O. (eds.) Proceedings of the 6th International Conference on Information Systems Security and Privacy, pp. 655\u2013662. SciTePress (2020). https:\/\/doi.org\/10.5220\/0009143206550662","DOI":"10.5220\/0009143206550662"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Lei, H., Li, J., Li, S., Huang, M., Cheng, J., Bai, Y., Luo, X., Liu, C.: TrustControl: trusted private data usage control based on security enhanced TrustZone. Computers, Mater. Continua 73(3), 5687\u20135702 (2022). https:\/\/doi.org\/10.32604\/cmc.2022.030995","DOI":"10.32604\/cmc.2022.030995"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Liang, H., Li, M.: Bring the missing Jigsaw Back: TrustedClock for SGX enclaves. In: Proceedings of the 11th European Workshop on Systems Security, pp.\u00a01\u20136. No.\u00a08 in EuroSec 2018. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3193111.3193119","DOI":"10.1145\/3193111.3193119"},{"key":"7_CR11","unstructured":"Meta: Pyre - Pyre. https:\/\/pyre-check.org\/, (Accessed 31 Dec 2023)"},{"key":"7_CR12","unstructured":"OASIS Standard: eXtensible Access Control Markup Language (XACML) Version 3.0. https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html (2013), (Accessed 11 July 2024)"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON$$_{\\rm {ABC}}$$ usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004). https:\/\/doi.org\/10.1145\/984334.984339","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"9","key":"7_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MC.2011.225","volume":"44","author":"S Pearson","year":"2011","unstructured":"Pearson, S., Casassa-Mont, M.: Sticky policies: an approach for managing privacy across multiple parties. Computer 44(9), 60\u201368 (2011). https:\/\/doi.org\/10.1109\/MC.2011.225","journal-title":"Computer"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Ramahlosi, M.N., Akanbi, Y.M.A.: A Blockchain-based Model for Securing Data Pipeline in a Heterogeneous Information System (2024). https:\/\/doi.org\/10.48550\/arXiv.2401.09240","DOI":"10.48550\/arXiv.2401.09240"},{"key":"7_CR16","unstructured":"Tsai, C.C., Porter, D.E., Vij, M.: Graphene-SGX: a practical library OS for unmodified applications on SGX. In: 2017 USENIX Annual Technical Conference (USENIX ATC 2017), pp. 645\u2013658. USENIX Association, Santa Clara, CA (2017), https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Valadares, D.C.G., da\u00a0Silva, M.S.L., Brito, A.E.M., Salvador, E.M.: Achieving data dissemination with security using fiware and intel software guard extensions (SGX). In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp.\u00a01\u20137 (2018). https:\/\/doi.org\/10.1109\/ISCC.2018.8538590","DOI":"10.1109\/ISCC.2018.8538590"},{"issue":"6","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.1007\/s10796-020-10057-w","volume":"22","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Li, J., Zhao, X., Feng, G., Luo, X.R.: Using mobile phone data for emergency management: a systematic literature review. Inf. Syst. Front. 22(6), 1539\u20131559 (2020). https:\/\/doi.org\/10.1007\/s10796-020-10057-w","journal-title":"Inf. Syst. Front."},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjb\/e2015-60754-4","volume":"89","author":"S Wheatley","year":"2016","unstructured":"Wheatley, S., Maillart, T., Sornette, D.: The extreme risk of personal data breaches and the erosion of privacy. Euro. Phys. J. B 89(1), 1\u201312 (2016). https:\/\/doi.org\/10.1140\/epjb\/e2015-60754-4","journal-title":"Euro. Phys. J. B"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Xiao, Y., Zhang, N., Li, J., Lou, W., Hou, Y.T.: PrivacyGuard: enforcing private data usage control with blockchain and attested off-chain contract execution. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12309, pp. 610\u2013629. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59013-0_30","DOI":"10.1007\/978-3-030-59013-0_30"},{"key":"7_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2022.101777","volume":"94","author":"T Yabe","year":"2022","unstructured":"Yabe, T., Jones, N.K., Rao, P.S.C., Gonzalez, M.C., Ukkusuri, S.V.: Mobile phone location data for disasters: a review from natural hazards and epidemics. Comput. Environ. Urban Syst. 94, 101777 (2022). https:\/\/doi.org\/10.1016\/j.compenvurbsys.2022.101777","journal-title":"Comput. Environ. Urban Syst."},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Zualkernan, I.A., Aloul, F.A., Sakkia, V., Noman, H.A., Sowdagar, S., Hammadi, O.A.: An IoT-based emergency evacuation system. In: 2019 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), pp. 62\u201366 (2019). https:\/\/doi.org\/10.1109\/IoTaIS47347.2019.8980381","DOI":"10.1109\/IoTaIS47347.2019.8980381"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:10:57Z","timestamp":1741867857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}