engines and analytic networks can use the model. In
this context, we have shown that the approach can test
both context-based and parallel events. For this
purpose, all possible actions are calculated,
transferred into a Kripke structure and then checked.
One limitation is that the approach cannot test
temporal obligations at design time. Another
limitation of our approach is that only the whole petri
net can be validated with the given usage policies.
Checking partial sections, for example if the policy is
changed during the data flow, is not possible. We can
circumvent this fact by dividing the data flow into
appropriate sections.
In the future, we will provide more policy
definitions. In addition, we will introduce our own
tooling to read the IDS policies and automatically
generate the CTL* formulas for the model checking.
ACKNOWLEDGEMENTS
This work was funded by the German Federal
Ministry of Education and Research (BMBF) in
context of the InDaSpacePlus project (no.
01IS17031) and by the Fraunhofer-Cluster of
Excellence »Cognitive Internet Technologies«.
REFERENCES
Baldan, P., Bruni, A., Corradini, A., König, B., Rodríguez,
C., & Schwoon, S. (2012). Efficient unfolding of
contextual Petri nets. Theoretical Computer Science,
449, 2–22.
Basin, D., Harvan, M., Klaedtke, F., & Zălinescu, E. (2011).
MONPOLY: Monitoring usage-control policies. In
International conference on runtime verification (pp.
360–364). Springer.
Basin, D., Klaedtke, F., & Müller, S. (2010). Policy
monitoring in first-order temporal logic. In
International Conference on Computer Aided
Verification (pp. 1–18). Springer.
Becker, J., Probandt, W., & Vering, O. (2012).
Modellierungssprachen. In J. Becker, W. Probandt, &
O. Vering (Eds.), Grundsätze ordnungsmäßiger
Modellierung (pp. 4–30). Springer Berlin Heidelberg.
https://doi.org/10.1007/978-3-642-30412-5_2
Camunda services GmbH, IBM Corp., OMG, I., PNA
Group, SAP AG, & Trisotech, I. (June 2010). BPMN
2.0 by Example: Version 1.0. https://www.omg.org/cgi-
bin/doc?dtc/10-06-02
Cong, L. I., ZENG, Q., & Hua, D. (2014). Formulating the
data-flow modeling and verification for workflow: A
Petri net based approach. International Journal of
Science and Engineering Applications, 3, 107–112.
Eitel, A., Jung, C., Kühnle, C., Bruckner, F., Brost, G.,
Birnstill, P., Nagel, R., Bader, S., & Steinbuß, S. (2019).
Usage Control in the International Data Space:
Position Paper [Version 2.0]. https://www.interna
tionaldataspaces.org/wp-content/uploads/2020/06/
IDSA-Position-Paper-Usage-Control-in-IDS-2.0.pdf
Elrakaiby, Y., & Pang, J. (2014). Dynamic analysis of
usage control policies. In 2014 11th International
Conference on Security and Cryptography (SECRYPT)
(pp. 1–13). IEEE.
The European data strategy: Shaping Europe's digital
future. (2020). https://ec.europa.eu/commission/
presscorner/api/files/attachment/862109/European_dat
a_strategy_en.pdf.pdf
Jensen, K. (2013). Coloured Petri nets: basic concepts,
analysis methods and practical use (Vol. 1). Springer
Science & Business Media.
Katt, B., Zhang, X., & Hafner, M. (2009). Towards a usage
control policy specification with Petri nets. In OTM
Confederated International Conferences" On the Move
to Meaningful Internet Systems. Symposium conducted
at the meeting of Springer.
Lili, X., & Zhigang, Z. (2019). Formal Specification of
Concurrent Enforcement UCON Model with CTL
Logic. In International Conference on Artificial
Intelligence and Security (pp. 627–641). Springer.
Murata, T. (1989). Petri nets: Properties, analysis and
applications. Proceedings of the IEEE, 77(4), 541–580.
Object Management Group. (December 2017). OMG®
Unified Modeling Language® (OMG UML®): Version
2.5.1. https://www.omg.org/spec/UML/2.5.1/PDF
Otto, B., & Jarke, M. (2019). Designing a multi-sided data
platform: findings from the International Data Spaces
case. Electronic Markets
, 29(4), 561–580.
Park, J., & Sandhu, R. (2004). The UCONABC usage
control model. ACM Transactions on Information and
System Security (TISSEC), 7(1), 128–174.
Press, N. (2004). Understanding metadata. National
Information Standards Organization. ISBN1-880124-
62-9. Available at: www. niso. org/standards/resources
Pretschner, A., Rüesch, J., Schaefer, C., & Walter, T.
(2009). Formal analyses of usage control policies. In
2009 International Conference on Availability,
Reliability and Security (pp. 98–105). IEEE.
Sandhu, R., & Park, J. (2003). Usage control: A vision for
next generation access control. In International
Workshop on Mathematical Methods, Models, and
Architectures for Computer Network Security.
Symposium conducted at the meeting of Springer.
Schütte, J., & Brost, G. S. (2018). LUCON: Data flow
control for message-based IoT systems. In 2018 17th
IEEE International Conference On Trust, Security And
Privacy In Computing And Communications/12th IEEE
International Conference On Big Data Science And
Engineering (TrustCom/BigDataSE). Symposium
conducted at the meeting of IEEE.
Tebernum, D., & Chabrowski, D. (2020). A Conceptual
Framework for a Flexible Data Analytics Network.
Proceedings of the 9th International Conference on
Data Science, Technology and Applications(Volume 1).