
REFERENCES
Allahviranloo, M. and Axhausen, K. (2018). An optimiza-
tion model to measure utility of joint and solo activ-
ities. Transportation Research Part B: Methodologi-
cal, 108:172–187.
Bharadwaj, V. G. and Baras, J. S. (2003a). A framework for
automated negotiation of access control policies. In
DARPA Information Survivability Conference and Ex-
position,, volume 3, pages 216–216. IEEE Computer
Society.
Bharadwaj, V. G. and Baras, J. S. (2003b). Towards auto-
mated negotiation of access control policies. In Pro-
ceedings POLICY 2003. IEEE 4th International Work-
shop on Policies for Distributed Systems and Net-
works, pages 111–119. IEEE.
Chen, E., Zhu, Y., Zhou, Z., Lee, S.-Y., Wong, W. E.,
and Chu, W. C.-C. (2021). Policychain: a decentral-
ized authorization service with script-driven policy on
blockchain for internet of things. IEEE Internet of
Things Journal, 9(7):5391–5409.
Dasgupta, A., Gill, A., and Hussain, F. (2019). A con-
ceptual framework for data governance in iot-enabled
digital is ecosystems. In 8th International Confer-
ence on Data Science, Technology and Applications.
SCITEPRESS–Science and Technology Publications.
Enkhbat, R., Enkhbayar, J., and Griewank, A. (2015).
Global optimization approach to utility maximization
problem. International Journal of Pure and Applied
Mathematics, 103(3):485–497.
Gligor, V. D., Khurana, H., Koleva, R. K., Bharadwaj, V. G.,
and Baras, J. S. (2002). On the negotiation of access
control policies. In Security Protocols: 9th Interna-
tional Workshop Cambridge, UK, April 25–27, 2001
Revised Papers 9, pages 188–201. Springer.
Huber, M., Wessel, S., Brost, G. S., and Menz, N. (2022).
Building trust in data spaces.
Jansen, M., Meisen, T., Plociennik, C., Berg, H., Pomp,
A., and Windholz, W. (2023). Stop guessing in the
dark: Identified requirements for digital product pass-
port systems. Systems, 11(3):123.
King, M. R., Timms, P. D., and Mountney, S. (2023). A
proposed universal definition of a digital product pass-
port ecosystem (dppe): Worldviews, discrete capabil-
ities, stakeholder requirements and concerns. Journal
of Cleaner Production, 384:135538.
Larrinaga, F. (2022). Data sovereignty-requirements analy-
sis of manufacturing use cases.
Ma, S. (2015). Dynamic game access control based on trust.
In 2015 IEEE Trustcom/BigDataSE/ISPA, volume 1,
pages 1369–1373. IEEE.
Marden, J. R. and Shamma, J. S. (2018). Game theory and
control. Annual Review of Control, Robotics, and Au-
tonomous Systems, 1:105–134.
Martins, H. and Guerreiro, S. (2019). Access control chal-
lenges in enterprise ecosystems. Research Anthology
on Blockchain Technology in Business, Healthcare,
Education, and Government.
Medvet, E., Bartoli, A., Carminati, B., and Ferrari, E.
(2015). Evolutionary inference of attribute-based ac-
cess control policies. In Evolutionary Multi-Criterion
Optimization: 8th International Conference, EMO
2015, Guimarães, Portugal, March 29–April 1, 2015.
Proceedings, Part I 8, pages 351–365. Springer.
Mehregan, P. and Fong, P. W. (2016). Policy negotiation for
co-owned resources in relationship-based access con-
trol. In Proceedings of the 21st ACM on Symposium on
Access Control Models and Technologies, pages 125–
136.
Moura, J., Marinheiro, R. N., and Silva, J. C. (2019). Game
theory for cooperation in multi-access edge comput-
ing. In Paving the Way for 5G Through the Con-
vergence of Wireless Systems, pages 100–149. IGI
Global.
Otto, B., Rubina, A., Eitel, A., Teuscher, A., Schleimer,
A. M., Lange, C., Stingl, D., Loukipoudis, E., Brost,
G., Boege, G., et al. (2021). Gaia-x and ids.
Ouaddah, A., Abou Elkalam, A., and Ait Ouahman, A.
(2016). Fairaccess: a new blockchain-based access
control framework for the internet of things. Security
and communication networks, 9(18):5943–5964.
Preuveneers, D., Joosen, W., and Zudor, E. (2018). Pol-
icy reconciliation for access control in dynamic cross-
enterprise collaborations. Enterprise Information Sys-
tems, 12:279 – 299.
Servos, D. and Osborn, S. L. (2017). Current research and
open problems in attribute-based access control. ACM
Computing Surveys (CSUR), 49(4):1–45.
Shamma, J. S. (2020). Game theory, learning, and control
systems. National Science Review, 7(7):1118–1119.
Shojaiemehr, B., Rahmani, A. M., and Qader, N. N. (2018).
Cloud computing service negotiation: a systematic re-
view. Computer Standards & Interfaces, 55:196–206.
Steinbuss, S. et al. (2021). Usage control in the international
data spaces.
Subramaniam, M., Iyer, B., and Venkatraman, V. (2019).
Competing in digital ecosystems. Business Horizons,
62(1):83–94.
Vamvoudakis, K. G. and Hespanha, J. P. (2018). Game-
theory-based consensus learning of double-integrator
agents in the presence of worst-case adversaries.
Journal of Optimization Theory and Applications,
177:222–253.
Wang, Y., Tian, L., and Chen, Z. (2019). Game analysis of
access control based on user behavior trust. Informa-
tion, 10(4):132.
Yang, C., Tan, L., Shi, N., Xu, B., Cao, Y., and Yu, K.
(2020). Authprivacychain: A blockchain-based access
control framework with privacy protection in cloud.
IEEE Access, 8:70604–70615.
Zhang, Y. and He, J. (2015). A proactive access control
model based on stochastic game. In 2015 4th Interna-
tional Conference on Computer Science and Network
Technology (ICCSNT), volume 1, pages 1008–1011.
IEEE.
Zhang, Y., He, J., Zhao, B., Huang, Z., and Liu, R.
(2015). Towards more pro-active access control in
computer systems and networks. Computers & Se-
curity, 49:132–146.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
500