
International Multitopic Conference (INMIC), pages
111–118. IEEE.
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., and Wal-
ter, T. (2007). A policy language for distributed usage
control. In Biskup, J. and L
´
opez, J., editors, Computer
Security – ESORICS 2007, Lecture Notes in Computer
Science, pages 531–546. Springer. doi: 10.1007/978-
3-540-74835-9 35.
Hosseinzadeh, A., Eitel, A., and Jung, C. (2020). A system-
atic approach toward extracting technically enforce-
able policies from data usage control requirements:.
In Proceedings of the 6th International Conference
on Information Systems Security and Privacy, pages
397–405. SCITEPRESS - Science and Technology
Publications. doi: 10.5220/0008936003970405.
Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., and Voas, J. (2015).
Attribute-based access control, volume 48(2). IEEE.
Ianella, R. (2007). Open digital rights language (odrl).
Open Content Licensing: Cultivating the Creative
Commons.
IDSA (2023). Ids reference architecture model
4.0. https://docs.internationaldataspaces.orgids-
knowledgebasevids-ram-4. Online, accessed on
2024-01-19.
Jones, D., Snider, C., Nassehi, A., Yon, J., and Hicks, B.
(2020). Characterising the digital twin: A systematic
literature review. CIRP journal of manufacturing sci-
ence and technology, 29:36–52.
Jung, C. and D
¨
orr, J. (2022). Data usage control. In Otto,
B., ten Hompel, M., and Wrobel, S., editors, Design-
ing Data Spaces : The Ecosystem Approach to Com-
petitive Advantage, pages 129–146. Springer Inter-
national Publishing. doi: 10.1007/978-3-030-93975-
5 8.
Kanaan, K., Wermann, J., B
¨
ar, M. A., and Colombo, A. W.
(2023). Industry 4.0-compliant digitalization of a re-
configurable and flexible laser cutter module within
a digital factory. In 2023 IEEE International Con-
ference on Industrial Technology (ICIT), pages 1–7.
IEEE.
Kasdorf, B. (2015). Navigating the publishing rights land-
scape. Publishing Research Quarterly, 31(3):190–
200.
Lazouski, A., Martinelli, F., and Mori, P. (2010).
Usage control in computer security: A sur-
vey. Computer Science Review, 4(2):81–99. doi:
10.1016/j.cosrev.2010.02.002.
Lee, B., Kim, D.-K., Yang, H., and Jang, H. (2015). Role-
based access control for substation automation sys-
tems using xacml. Information Systems, 53:237–249.
Lee, E., Seo, Y.-D., Oh, S.-R., and Kim, Y.-G. (2021). A
survey on standards for interoperability and security in
the internet of things. IEEE Communications Surveys
& Tutorials, 23(2):1020–1047.
Liu, M., Fang, S., Dong, H., and Xu, C. (2021). Review of
digital twin about concepts, technologies, and indus-
trial applications. Journal of Manufacturing Systems,
58:346–361.
Mahalle, P. N., Anggorojati, B., Prasad, N. R., and Prasad,
R. (2013). Identity authentication and capability based
access control (iacac) for the internet of things. Jour-
nal of Cyber Security and Mobility, 1(4):309–348.
Masood, R., Shibli, M. A., and Bilal, M. (2012). Usage
control model specification in xacml policy language:
Xacml policy engine of ucon. In Computer Informa-
tion Systems and Industrial Management: 11th IFIP
TC 8 International Conference, CISIM 2012, Venice,
Italy, September 26-28, 2012. Proceedings 11, pages
68–79. Springer.
Moghaddam, F. F., Wieder, P., and Yahyapour, R. (2016).
Policy engine as a service (peaas): an approach to a
reliable policy management framework in cloud com-
puting environments. In 2016 IEEE 4th International
Conference on Future Internet of Things and Cloud
(FiCloud), pages 137–144. IEEE.
OPA (2023). Open policy agent introduction.
https://www.openpolicyagent.org/docs/latest/. On-
line, accessed on 2024-01-19.
Park, J. and Sandhu, R. (2002). Towards usage control mod-
els: beyond traditional access control. In Proceed-
ings of the seventh ACM symposium on Access control
models and technologies, pages 57–64.
Park, J. and Sandhu, R. (2004). The UCONABC us-
age control model. ACM transactions on informa-
tion and system security (TISSEC), 7(1):128–174. doi:
10.1145/984334.984339.
Patil, V., Mei, A., and Mancini, L. V. (2007). Addressing in-
teroperability issues in access control models. In Pro-
ceedings of the 2nd ACM symposium on Information,
computer and communications security, pages 389–
391.
Preukschat, A. and Reed, D. (2021). Self-sovereign identity.
Manning Publications.
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., and Fang, B.
(2020). A survey on access control in the age of
internet of things. IEEE Internet of Things Journal,
7(6):4682–4696.
Samarati, P. and de Vimercati, S. C. (2000). Access control:
Policies, models, and mechanisms. In International
school on foundations of security analysis and design,
pages 137–196. Springer.
Sandhu, R. S. (1998). Role-based access control. In Ad-
vances in computers, volume 46, pages 237–286. El-
sevier.
Schinke, L., Hoppen, M., Atanasyan, A., Gong, X., Heinze,
F., Stollenwerk, K., and Roßmann, H.-J. (2023).
Trustful Data Sharing in the Forest-based Sector - Op-
portunities and Challenges for a Data Trustee. In
VLDBW 2023: workshops at VLDB 2023 : joint pro-
ceedings of workshops at the 49th International Con-
ference on Very Large Data Bases (VLDB 2023) : Van-
couver, Canada, August 28-September 1, 2023, vol-
ume 3462 of CEUR workshop proceedings. 2nd In-
ternational Workshop on Data Ecosystems, Vancouver
(Canada), 28 Aug 2023.
Sch
¨
utte, J. and Brost, G. S. (2018). Lucon: Data flow con-
trol for message-based iot systems. In 2018 17th IEEE
international conference on trust, security and privacy
in computing and communications/12th IEEE interna-
tional conference on big data science and engineering
(TrustCom/BigDataSE), pages 289–299. IEEE.
IoTBDS 2024 - 9th International Conference on Internet of Things, Big Data and Security
84