Chaari, S., Badr, Y., & Biennier, F. (2008). Enhancing web
service selection by QoS-based ontology and WS-
policy. In Proceedings of the 2008 ACM symposium on
Applied computing, 2426-2431.
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access
control model for security policy reasoning in cloud
computing. The Journal of Supercomputing, 67(3),
711-722.
Di Francesco Maesa, D., Mori, P., & Ricci, L. (2017).
Distributed access control through blockchain
technology,31-32.
Garcia, D., Toledo, M. B. F., Capretz, M. A., Allison, D. S.,
Blair, G. S., Grace, P., & Flores, C. (2009). Towards a
base ontology for privacy protection in service-oriented
architecture. In 2009 IEEE International Conference on
Service-Oriented Computing and Applications
(SOCA),1-8.
Hendrikx, F., Bubendorfer, K., & Chard, R. (2015).
Reputation systems: A survey and taxonomy. Journal
of Parallel and Distributed Computing, 75, 184-197.
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., & Walter,
T. (2007). A policy language for distributed usage
control. In European Symposium on Research in
Computer Security, 531-546.
Hu, Y. J., Guo, H. Y., & Lin, G. D. (2008). Semantic
enforcement of privacy protection policies via the
combination of ontologies and rules. In 2008 IEEE
International Conference on Sensor Networks,
Ubiquitous, and Trustworthy Computing, 400-407.
ISO, IEC. (2004). information technology–multimedia
framework (MPEG-21) Part 5: Rights Expression
Language. International Organization for
standardization.
Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust
and reputation systems for online service provision.
Decision support systems, 43(2), 618-644.
Kaaniche, N., & Laurent, M. (2017). A blockchain-based
data usage auditing architecture with enhanced privacy
and availability. In 2017 IEEE 16th International
Symposium on Network Computing and Applications
(NCA), 1-5.
Kelbert, F., & Pretschner, A. (2013). Data usage control
enforcement in distributed systems. In Proceedings of
the third ACM conference on Data and application
security and privacy, 71-82.
Kim, A., Luo, J., & Kang, M. (2005). Security ontology for
annotating resources. In OTM Confederated
International Conferences" On the Move to Meaningful
Internet Systems",1483-1499.
Kumari, P., Pretschner, A., Peschla, J., & Kuhn, J. M.
(2011). Distributed data usage control for web
applications: a social network implementation. In
Proceedings of the first ACM conference on Data and
application security and privacy,85-96.
Liu, C. L. (2014). Cloud service access control system
based on ontologies. Advances in Engineering
Software, 69, 26-36.
Masoumzadeh, A., & Joshi, J. (2010). Osnac: An ontology-
based access control model for social networking
systems. In 2010 IEEE Second International
Conference on Social Computing, 751-759.
Neisse, R., Steri, G., & Nai-Fovino, I. (2017). A
blockchain-based approach for data accountability and
provenance tracking. In Proceedings of the 12th
International Conference on Availability, Reliability
and Security 1-10
.
Nejdl, W., Olmedilla, D., Winslett, M., & Zhang, C. C.
(2005). Ontology-based policy specification and
management. In European Semantic Web Conference,
290-302.
Open Mobile Alliance. (2008.) DRM Rights Expression
Language V2.1. http://www.openmobilealliance.org/
release/DRM/V2_1-20080805-C/OMA-TS-DRM_RE
L-V2_120080805-C.pdf,1-68.
Panahifar, F., Byrne, P. J., Salam, M. A., & Heavey, C.
(2018). Supply chain collaboration and firm’s
performance. Journal of Enterprise Information
Management, 31(3), 358-379.
Park, J., & Sandhu, R. (2004). The UCONABC usage
control model. ACM Transactions on Information and
System Security, 7(1), 128-174.
Pretschner, A., Hilty, M., & Basin, D. (2006). Distributed
usage control. Communications of the ACM, 49(9), 39-
44.
Pretschner, A., Lovat, E., & Büchler, M. (2011).
Representation-independent data usage control. In Data
Privacy Management and Autonomous Spontaneus
Security,122-140.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C.
E. (1996). Role-based access control models.
Computer, 29(2), 38-47.
Truong, N. B., Sun, K., Lee, G. M., & Guo, Y. (2019).
GDPR-compliant personal data management: A
blockchain-based solution. arXiv preprint
arXiv:1904.03038.
Tsai, W. T., & Shao, Q. (2011). Role-based access-control
using reference ontology in clouds. In 2011 Tenth
International Symposium on Autonomous
Decentralized Systems, 121-128.
Wang, L., Wijesekera, D., & Jajodia, S. (2004). A logic-
based framework for attribute-based access control. In
Proceedings of the 2004 ACM workshop on Formal
methods in security engineering 45-55.
Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev,
A., & Mendling, J. (2016). Untrusted business process
monitoring and execution using blockchain. In
International Conference on Business Process
Management 329-347.
Wirth, C., & Kolain, M. (2018). Privacy by blockchain
design: a blockchain-enabled GDPR-compliant
approach for handling personal data. In Proceedings of
1st ERCIM Blockchain Workshop 2018. European
Society for Socially Embedded Technologies
(EUSSET).
Zhang, X., Park, J., Parisi-Presicce, F., & Sandhu, R.
(2004). A logical specification for usage control. In
Proceedings of the ninth ACM symposium on Access
control models and technologies, 1-10.