{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:58:26Z","timestamp":1776095906036,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Federal Ministry for Economic Affairs and Climate Action"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3604995","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Implementing Data Sovereignty: Requirements &amp; Challenges from Practice"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2095-662X","authenticated-orcid":false,"given":"Malte","family":"Hellmeier","sequence":"first","affiliation":[{"name":"Fraunhofer ISST, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2309-6183","authenticated-orcid":false,"given":"Julia","family":"Pampus","sequence":"additional","affiliation":[{"name":"Fraunhofer ISST, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3248-1163","authenticated-orcid":false,"given":"Haydar","family":"Qarawlus","sequence":"additional","affiliation":[{"name":"Fraunhofer ISST, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9524-4459","authenticated-orcid":false,"given":"Falk","family":"Howar","sequence":"additional","affiliation":[{"name":"TU Dortmund, Germany and Fraunhofer ISST, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9152-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Ines Akaichi and Sabrina Kirrane. 2022. Usage Control Specification Enforcement and Robustness: A Survey. https:\/\/doi.org\/10.48550\/arXiv.2203.04800","DOI":"10.48550\/arXiv.2203.04800"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jos\u00e9\u00a0Mar\u00eda Cavanillas Edward Curry and Wolfgang Wahlster (Eds.). 2016. New horizons for a data-driven economy: A roadmap for usage and exploitation of big data in Europe. Springer International Publishing AG Cham.","DOI":"10.1007\/978-3-319-21569-3"},{"key":"e_1_3_2_1_4_1","volume-title":"Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis","author":"Charmaz Kathy","unstructured":"Kathy Charmaz. 2006. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. Sage Publications Ltd, London."},{"key":"e_1_3_2_1_5_1","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory (4 ed.)","author":"Corbin M.","unstructured":"Juliet\u00a0M. Corbin and Anselm\u00a0L. Strauss. 2015. Basics of qualitative research: Techniques and procedures for developing grounded theory (4 ed.). Sage, Los Angeles, Calif."},{"key":"e_1_3_2_1_6_1","volume-title":"Data sovereignty, cybersecurity, and challenges for globalization. Georgetown Journal of International Affairs 16","author":"de Jong-Chen Jing","year":"2015","unstructured":"Jing de Jong-Chen. 2015. Data sovereignty, cybersecurity, and challenges for globalization. Georgetown Journal of International Affairs 16 (2015). https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/geojaf16&div=72&id=&page="},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/356778.356782"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9163-y"},{"key":"e_1_3_2_1_9_1","unstructured":"European Commission. 2020. European data strategy: Making the EU a role model for a society empowered by data. https:\/\/ec.europa.eu\/info\/strategy\/priorities-2019-2024\/europe-fit-digital-age\/european-data-strategy_en"},{"key":"e_1_3_2_1_10_1","unstructured":"European Commission. 2022. Proposal for a Regulation of the European Parliament and of the Council on harmonised Rules on Fair Access to and Use of Data (Data Act). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:52022PC0068"},{"key":"e_1_3_2_1_11_1","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_12_1","volume-title":"The discovery of grounded theory: Strategies for qualitative research","author":"Glaser G.","unstructured":"Barney\u00a0G. Glaser and Anselm\u00a0L. Strauss. 1967. The discovery of grounded theory: Strategies for qualitative research. Aldine, New York, NY."},{"key":"e_1_3_2_1_13_1","volume-title":"Enforcing Rights in a Changing World","author":"Hallinan Dara","unstructured":"Dara Hallinan. 2022. Data Protection and Privacy, Volume 14: Enforcing Rights in a Changing World. Bloomsbury Publishing Plc, London."},{"key":"e_1_3_2_1_14_1","volume-title":"ECIS 2023 Research Papers (2023","author":"Hellmeier Malte","year":"2023","unstructured":"Malte Hellmeier and Franziska von Scherenberg. 2023. A Delimitation of Data Sovereignty from Digital and Technological Sovereignty. ECIS 2023 Research Papers (2023). https:\/\/aisel.aisnet.org\/ecis2023_rp\/306"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5220\/0008936003970405"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.24"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720982012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-019-00614-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131718"},{"key":"e_1_3_2_1_21_1","volume-title":"InterViews: Learning the craft of qualitative research interviewing (2 ed.)","author":"Kvale Steinar","unstructured":"Steinar Kvale and Svend Brinkmann. 2009. InterViews: Learning the craft of qualitative research interviewing (2 ed.). Sage, Los Angeles."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Lars Nagel and Douwe Lycklama. 2021. Design Principles for Data Spaces - Position Paper. https:\/\/doi.org\/10.5281\/ZENODO.5105744","DOI":"10.5281\/ZENODO.5105744"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Boris Otto Sebastian Steinbuss Andreas Teuscher and Steffen Lohmann. 2019. IDS Reference Architecture Model. https:\/\/doi.org\/10.5281\/ZENODO.5105529","DOI":"10.5281\/ZENODO.5105529"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93975-5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21155189"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.042"},{"key":"e_1_3_2_1_27_1","volume-title":"Interviews","author":"Rapley Tim","unstructured":"Tim Rapley. 2004. Interviews. In Qualitative Research Practice, Clive Seale, Giampietro Gobo, Jaber Gubrium, and David Silverman (Eds.). Sage Publications Ltd, London, 15\u201333."},{"key":"e_1_3_2_1_28_1","volume-title":"Qualitative interviewing: The art of hearing data (3 ed.)","author":"Rubin J.","unstructured":"Herbert\u00a0J. Rubin and Irene\u00a0S. Rubin. 2012. Qualitative interviewing: The art of hearing data (3 ed.). Sage, Los Angeles and London and New Delhi and Singapore and Washington DC."},{"key":"e_1_3_2_1_29_1","volume-title":"The coding manual for qualitative researchers (2 ed.)","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a. 2013. The coding manual for qualitative researchers (2 ed.). Sage, Los Angeles, Calif."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767216"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17926-6_4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Clive Seale Giampietro Gobo Jaber Gubrium and David Silverman (Eds.). 2004. Qualitative Research Practice. Sage Publications Ltd London. https:\/\/doi.org\/10.4135\/9781848608191","DOI":"10.4135\/9781848608191"},{"key":"e_1_3_2_1_34_1","article-title":"Distinguishing Between the Strains Grounded Theory: Classical, Interpretive and Constructivist","volume":"3","author":"Sebastian Kailah","year":"2019","unstructured":"Kailah Sebastian. 2019. Distinguishing Between the Strains Grounded Theory: Classical, Interpretive and Constructivist. Journal for Social Thought (JST) 3, 1 (2019). https:\/\/ojs.lib.uwo.ca\/index.php\/jst\/article\/view\/4116","journal-title":"Journal for Social Thought (JST)"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392212"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884833"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Valentin Zieglmeier and Alexander Pretschner. 2021. Trustworthy Transparency by Design. https:\/\/doi.org\/10.48550\/arXiv.2103.10769","DOI":"10.48550\/arXiv.2103.10769"}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3604995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3604995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:13Z","timestamp":1750178173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3604995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":37,"alternative-id":["10.1145\/3600160.3604995","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3604995","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}