{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:49Z","timestamp":1767339349805,"version":"3.48.0"},"reference-count":185,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101120726"],"award-info":[{"award-number":["101120726"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3647085","type":"journal-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:42:48Z","timestamp":1766428968000},"page":"216438-216465","source":"Crossref","is-referenced-by-count":1,"title":["Digital Sovereignty for Collaborative AI Engineering: A Survey"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6895-4503","authenticated-orcid":false,"given":"Venkata Satya Sai Ajay","family":"Daliparthi","sequence":"first","affiliation":[{"name":"Department of Computer Science, Blekinge Institute of Technology, Karlskrona, Blekinge, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4814-4428","authenticated-orcid":false,"given":"Kurt","family":"Tutschku","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Blekinge Institute of Technology, Karlskrona, Blekinge, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4071-4596","authenticated-orcid":false,"given":"Victor R.","family":"Kebande","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Blekinge Institute of Technology, Karlskrona, Blekinge, Sweden"}]},{"given":"Nurul","family":"Momen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Oslo Metropolitan University, Oslo, Norway"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2101883"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s44206-022-00021-3"},{"volume-title":"Regulation (eu) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/ec (general Data Protection Regulation)","year":"2016","key":"ref3"},{"issue":"2","key":"ref4","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MNET.2021.9387709","article-title":"The road to European digital sovereignty with Gaia-X and IDSA","volume":"35","author":"Braud","year":"2021","journal-title":"IEEE Netw."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-021-04776-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3461564.3468165"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3616400"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata59044.2023.10386257"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/jices-12-2022-0108"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47909-0_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3572751.3572755"},{"volume-title":"Proposal for a Regulation of the European Parliament and of the Council Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and Amending Certain Union Legislative Acts","year":"2021","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2102896"},{"volume-title":"GAIA-X: Driver of Digital Innovation in Europe","year":"2020","author":"Biegel","key":"ref14"},{"volume-title":"Digital Sovereignty for Europe","year":"2020","author":"Madiega","key":"ref15"},{"key":"ref16","article-title":"What is digital sovereignty and why is Europe so interested in it","volume-title":"World Economic Forum","author":"Fleming","year":"2021"},{"volume-title":"Digitale Souver\u00e4nit\u00e4t Im Kontext Plattformbasierter \u00d6kosysteme","year":"2019","author":"Schauf","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icetsis61505.2024.10459534"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33080-3_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.358"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585834"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462595"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s44206-022-00030-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/scc55611.2022.00059"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/buildings13020442"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3076259"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26490-0_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/data7020020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-4641-9_6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819865984"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/17489725.2023.2239180"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s44206-024-00146-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720982012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16088-2_6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86144-5_29"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(21)00008-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36096-1_9"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3647085","article-title":"Digital sovereignty for collaborative AI engineering","author":"Daliparthi","year":"2025"},{"key":"ref39","first-page":"71","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume-title":"BMJ","volume":"372","author":"Page","year":"2021"},{"volume-title":"BDSG: Bundesdatenschutzgesetz","year":"2007","author":"Gola","key":"ref40"},{"volume-title":"Datalag (1973:289)","year":"1973","key":"ref41"},{"volume-title":"California Privacy Rights Act","year":"2024","key":"ref42"},{"volume-title":"Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People","year":"2022","key":"ref43"},{"volume-title":"What is Electronic Book Exchange (ebx)?\u2013Definition From Techopedia","year":"2024","key":"ref44"},{"volume-title":"AWS Control Tower and AWS Organizations\u2013AWS Organizations","year":"2025","key":"ref45"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.4135\/9781412980173.n143","volume-title":"Foreign Intelligence Surveillance Act","author":"Martin","year":"2011"},{"volume-title":"CLOUD Act","year":"2024","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56478-9_17"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/coins57856.2023.10189319"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/noms59830.2024.10575272"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3590777.3590794"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/fi11100220"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s22166260"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00843-z"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.029"},{"key":"ref56","first-page":"1","article-title":"FAME: Federated decentralized trusted data marketplace for embedded finance","volume-title":"Proc. Int. Conf. Smart Appl.","author":"Mavrogiorgou"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/cbi54897.2022.00020"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98636-0_10"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2023.02.051"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-024-00315-5"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62466-8_12"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93975-5_30"},{"key":"ref63","first-page":"1","article-title":"Conception and requirements identification of GAIA-X-based service offerings","volume-title":"Proc. 29th Americas Conf. Inf. Syst.","author":"Tanrikulu"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2024.100249"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3161478"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3644713.3644758"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/dcoss-iot58021.2023.00088"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3161478"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.18"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13101959"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.18690\/um.fov.6.2023.18"},{"volume-title":"Dataspace Protocol 2024-1 | IDS Knowledge Base","year":"2024","key":"ref72"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36096-1_11"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2101885"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2008","author":"Nakamoto","key":"ref75"},{"volume-title":"Decentralized Finance (Defi)","year":"2020","author":"Zetzsche","key":"ref76"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.14763\/2024.1.1741"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-021-09566-7"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2102895"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v26i5.11685"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2670-8_2"},{"volume-title":"European Union and the Search for Digital Sovereignty: Building \u2019Fortress Europe\u2019 or Preparing for a New World?","year":"2020","author":"Burwell","key":"ref82"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00423-6"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2101887"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6774-5_3"},{"volume-title":"Catena-X: Your Automotive Network | Catena-X","year":"2025","key":"ref86"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s44206-022-00025-z"},{"volume-title":"FIWARE\u2013Open APIs for Open Minds","year":"2021","key":"ref88"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17834-4_14"},{"key":"ref90","first-page":"1","article-title":"Semantic discovery and selection of data connectors in international data spaces","volume-title":"Proc. Workshop I-ESA","volume":"3214","author":"Firdausy"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3522664.3528593"},{"key":"ref92","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref93","first-page":"1","article-title":"AI pipeline\u2013bringing AI to you: End-to-end integration of data, algorithms and deployment tools","volume-title":"Proc. Emerg. Deep Learn. Accel. (EDLA) Workshop","author":"Su"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3403572"},{"volume-title":"TFX | ML Production Pipelines","year":"2025","key":"ref95"},{"volume-title":"Build Production-Grade Data and ML Workflows, Hassle-Free With Flyte","year":"2025","key":"ref96"},{"volume-title":"Metaflow\u2014A Framework for Real-Life ML, AI, and Data Science","year":"2025","key":"ref97"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/etfa54631.2023.10275583"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/indin51400.2023.10218150"},{"issue":"5","key":"ref100","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/5.4442","article-title":"The first ten years of public-key cryptography","volume":"76","author":"Diffie","year":"1988","journal-title":"Proc. IEEE"},{"volume-title":"Prohibiting Secure Sockets Layer (SSL) Version 2.0","year":"2011","author":"Polk","key":"ref101"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3581773"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/seed51797.2021.00025"},{"volume-title":"Cloud External Key Manager | Cloud Kms Documentation","year":"2025","key":"ref104"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.3390\/computers13040104"},{"volume-title":"What Are Zk-SNARKs?","year":"2023","key":"ref106"},{"volume-title":"Intel Software Guard Extensions (Intel SGX)","year":"2025","key":"ref107"},{"volume-title":"AMD Secure Encrypted Virtualization (SEV)","year":"2025","key":"ref108"},{"volume-title":"NVIDIA Confidential Computing","year":"2025","key":"ref109"},{"volume-title":"Nitro Enclaves AWS","year":"2025","key":"ref110"},{"volume-title":"Google Confidential Computing","year":"2025","key":"ref111"},{"key":"ref112","first-page":"991","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Bulck"},{"volume-title":"Microsoft SEAL: Fast and Easy-to-Use Homomorphic Encryption Library","year":"2025","key":"ref113"},{"volume-title":"Fully Homomorphic Encryption Content Solution","year":"2018","key":"ref114"},{"volume-title":"TFHE Library: Fast Fully Homomorphic Encryption Over the Torus","year":"2016","author":"Chillotti","key":"ref115"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2008.33"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3387108"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3494106.3528686"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.07.027"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167256"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata59044.2023.10386824"},{"volume-title":"The TLS Protocol Version 1.0","year":"1999","author":"Allen","key":"ref124"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764803"},{"volume-title":"XMCL\u2014The Extensible Media Commerce Language","year":"2002","author":"Ayars","key":"ref126"},{"key":"ref127","article-title":"Open digital rights language (ODRL)","volume-title":"Open Content Licensing: Cultivating the Creative Commons","author":"Ianella","year":"2007"},{"volume-title":"ODRL Information Model 2.2","year":"2024","author":"Iannella","key":"ref128"},{"volume-title":"Standard for Federated Machine Learning of Semantic Information Agents\u2014IEEE Standards Association (P3427)","year":"2024","key":"ref129"},{"volume-title":"ETSI Permissioned Distributed Ledgers (PDL) Standards","year":"2024","key":"ref130"},{"volume-title":"EuroStack: European Industrial Policy Initiative Bringing Together Tech, Governance and Funding for Europe-Focused Investment To Build and Adopt a Suite of Digital Infrastructures","year":"2025","key":"ref131"},{"key":"ref132","first-page":"314","article-title":"A conceptual model of benchmarking data and its implications for data mapping in the data economy, \"A conceptual model of benchmarking data and its implications for data mapping in the data economy","volume-title":"Multikonferenz Wirtschaftsinformatik (MKWI)","volume":"2018","author":"Spiekermann","year":"2018"},{"volume-title":"Design Principles for Data Spaces: Position Paper","year":"2025","key":"ref133"},{"volume-title":"IDSA Data Spaces","year":"2025","key":"ref134"},{"key":"ref135","first-page":"22","article-title":"Aligning Dutch logistics data spaces initiatives to the international data spaces: Discussing the state of development","volume-title":"Proc. Workshop I-ESA","volume":"3214","author":"Piest"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98636-0_16"},{"volume-title":"European Data Strategy","year":"2025","key":"ref137"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3565011.3569058"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93975-5_7"},{"key":"ref140","first-page":"1","article-title":"Design knowledge for GAIA-X-compliant ecosystems: A literature review","volume-title":"Proc. 29th Americas Conf. Inf. Syst.","author":"Hefft"},{"volume-title":"Eclipse Dataspace Protocol","year":"2024","author":"Steinbuss","key":"ref141"},{"volume-title":"Ethereum Virtual Machine (EVM)","year":"2025","key":"ref142"},{"key":"ref143","first-page":"482","article-title":"Local differential privacy in smart manufacturing: Application scenario, mechanisms and tools","volume-title":"Proc. 32nd CIRP Design Conf.","author":"G\u00e4rtner"},{"volume-title":"Data Protection and Privacy Legislation Worldwide","year":"2024","key":"ref144"},{"volume-title":"Safeguarding European Values With Digital Sovereignty: An Analysis of Statements and Policies","year":"2021","author":"Roberts","key":"ref145"},{"issue":"2","key":"ref146","first-page":"32","article-title":"Creating data spaces based on gaia-x and ids","volume":"15","author":"Otto","year":"2020","journal-title":"Hitachi Res. Inst. Bull."},{"volume-title":"Economy and Society: An Outline of Interpretive Sociology","year":"1978","author":"Weber","key":"ref147"},{"key":"ref148","doi-asserted-by":"crossref","DOI":"10.1093\/he\/9780199644704.001.0001","article-title":"On the extra current","volume-title":"The Concept of Law","author":"Hart","year":"2012"},{"volume-title":"BONSEYES\u2014The Artificial Intelligence Marketplace","year":"2025","key":"ref149"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19762-8_27"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2024.3434560"},{"key":"ref152","volume-title":"Political Theology: Four Chapters on the Concept of Sovereignty","volume":"1","author":"Schmitt","year":"2010"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511973741"},{"volume-title":"(digital) Sovereignty 2.0\u2013Talk By Prof. Jamal Shahin","year":"2021","key":"ref154"},{"issue":"3","key":"ref155","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1038\/scientificamerican0397-78","article-title":"Trusted systems","volume":"276","author":"Stefik","year":"1997","journal-title":"Sci. American"},{"key":"ref156","doi-asserted-by":"crossref","DOI":"10.14763\/2020.4.1532","volume-title":"Digital Sovereignty","author":"Pohle","year":"2020"},{"volume-title":"Law Enforcement Information Requests\u2013Amazon Customer Service","year":"2024","key":"ref157"},{"article-title":"Requests for user information\u2014Google Transparency Report","volume-title":"Google Transparency Rep.","year":"2024","key":"ref158"},{"volume-title":"U.S. National Security Orders Reports | Microsoft CSR","year":"2024","key":"ref159"},{"volume-title":"Globalization its Discontents","year":"2002","author":"Stiglitz","key":"ref160"},{"volume-title":"Companies That Are Worth More Than Countries","year":"2024","key":"ref161"},{"volume-title":"Computer Networks","year":"2011","author":"Tanenbaum","key":"ref162"},{"volume-title":"W3C Data Privacy Vocabulary (DPV)","year":"2022","key":"ref163"},{"volume-title":"Information Technology\u2014Security Techniques\u2013information Security Management Systems\u2014Requirements","year":"2005","key":"ref164"},{"volume-title":"Information Technology\u2013artificial Intelligence\u2013 Management System","year":"2023","key":"ref165"},{"volume-title":"AWS Digital Sovereignty","year":"2025","key":"ref166"},{"volume-title":"Google Cloud Digital Sovereignty Explorer","year":"2025","key":"ref167"},{"volume-title":"Microsoft Cloud for Sovereignty | Microsoft","year":"2025","key":"ref168"},{"volume-title":"ODRL Information Model 2.2","year":"2024","key":"ref169"},{"volume-title":"Digital Computer | Evolution, Components, & Features","year":"2024","key":"ref170"},{"volume-title":"Digital","year":"2024","key":"ref171"},{"volume-title":"Sovereignty","year":"1999","author":"Krasner","key":"ref172"},{"volume-title":"Sovereignty | Definition, Characteristics, Types, History, & Facts","year":"2024","author":"Editors","key":"ref173"},{"volume-title":"Definition of Digital","year":"2024","key":"ref174"},{"volume-title":"Definition of Sovereignty","year":"2024","author":"Merriam-Webster","key":"ref175"},{"volume-title":"Digital\u2013Definition, Meaning & Usage","year":"2024","key":"ref176"},{"volume-title":"Sovereignty","year":"2024","key":"ref177"},{"volume-title":"Hobbes\u2019s Leviathan","year":"1967","author":"Hobbes","key":"ref178"},{"volume-title":"Sovereignty: Organized Hypocrisy","year":"1999","author":"Krasner","key":"ref179"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-20317-8_23"},{"volume-title":"Politische Geographie","year":"1897","author":"Ratzel","key":"ref181"},{"volume-title":"Neuromancer","year":"1984","author":"Gibson","key":"ref182"},{"volume-title":"Google Cloud AI and Machine Learning Products: Tools to Build, Deploy, and Manage AI Solutions","year":"2025","key":"ref183"},{"volume-title":"Amazon Sagemaker: Build, Train, and Deploy Machine Learning Models","year":"2025","key":"ref184"},{"volume-title":"Azure Machine Learning: Build, Train, and Deploy Models","year":"2025","key":"ref185"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11311451.pdf?arnumber=11311451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:45:30Z","timestamp":1767332730000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11311451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":185,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3647085","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}