In this report, we focus on data usage control and data provenance that are conceptual and technological solutions to cope with data sovereignty challenges. We introduce a common scenario for the Industry 4.0 age, in which a supplier and an original equipment manufacturer (OEM) are exchanging data to mitigate risks in the supply chain management. We describe the difference between access control and usage control, the usage control concepts and related concepts such as digital rights management or user managed access. We present the implementation of data usage control in the IDS. In doing so, we present possible integration layers and its integration with the IDS Reference Architecture Model. In addition, we also present the IDS Usage Cont...
An International Data Space (IDS) aims to support sharing sensitive data among trusted actors, enabl...
Current inter-organizational data exchange is restricted to essential information that serves to ful...
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereign...
In this report, we focus on data usage control and data provenance that are conceptual and technolog...
In the age of Industry 4.0, data exchange between different organizations is an essential prerequisi...
Purpose: Current business challenges force companies to exchange critical and sensitive data. The da...
This position paper provides requirements to data sovereignty, data usage control and data provenanc...
International audienceData in smart cities is commonly generated by a large variety of participants ...
The International Data Spaces (IDS) are virtual data spaces leveraging existing standards and techno...
Organizations are becoming ever more aware that their data is a valuable asset requiring protection ...
Data sovereignty is the right that individuals and organizations own to control the access to and th...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
AbstractThe emerging research and application domains of the Internet-of-Things and Big Data, togeth...
These days, sensitive and personal information is used within a wide range of applications. The exch...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
An International Data Space (IDS) aims to support sharing sensitive data among trusted actors, enabl...
Current inter-organizational data exchange is restricted to essential information that serves to ful...
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereign...
In this report, we focus on data usage control and data provenance that are conceptual and technolog...
In the age of Industry 4.0, data exchange between different organizations is an essential prerequisi...
Purpose: Current business challenges force companies to exchange critical and sensitive data. The da...
This position paper provides requirements to data sovereignty, data usage control and data provenanc...
International audienceData in smart cities is commonly generated by a large variety of participants ...
The International Data Spaces (IDS) are virtual data spaces leveraging existing standards and techno...
Organizations are becoming ever more aware that their data is a valuable asset requiring protection ...
Data sovereignty is the right that individuals and organizations own to control the access to and th...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
AbstractThe emerging research and application domains of the Internet-of-Things and Big Data, togeth...
These days, sensitive and personal information is used within a wide range of applications. The exch...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
An International Data Space (IDS) aims to support sharing sensitive data among trusted actors, enabl...
Current inter-organizational data exchange is restricted to essential information that serves to ful...
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereign...