Designing a multi-sided data platform: findings from the International Data Spaces case
The paper presents the findings from a 3-year single-case study conducted in connection
with the International Data Spaces (IDS) initiative. The IDS represents a multi-sided platform …
with the International Data Spaces (IDS) initiative. The IDS represents a multi-sided platform …
Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
{6thSense}: A context-aware sensor-based attack detector for smart devices
Sensors (eg, light, gyroscope, accelerometer) and sensing enabled applications on a smart
device make the applications more user-friendly and efficient. However, the current …
device make the applications more user-friendly and efficient. However, the current …
[HTML][HTML] A comprehensive review of usage control frameworks
I Akaichi, S Kirrane - Computer Science Review, 2025 - Elsevier
The sharing of data and digital assets in a decentralized settling is entangled with various
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
legislative challenges, including, but not limited to, the need to adhere to legal requirements …
[HTML][HTML] SecKit: a model-based security toolkit for the internet of things
The control and protection of user data is a very important aspect in the design and
deployment of the Internet of Things (IoT). The heterogeneity of IoT technologies, the large …
deployment of the Internet of Things (IoT). The heterogeneity of IoT technologies, the large …
Droidforce: Enforcing complex, data-centric, system-wide policies in android
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data
such as contacts, photos, and e-mails. Sensors provide access to the phone's physical …
such as contacts, photos, and e-mails. Sensors provide access to the phone's physical …
Semadroid: A privacy-aware sensor management framework for smartphones
While mobile sensing applications are booming, the sensor management mechanisms in
current smartphone operating systems are left behind--they are incomprehensive and …
current smartphone operating systems are left behind--they are incomprehensive and …
Blockchain based resource governance for decentralized web environments
Decentralization initiatives such as Solid, Digi. me, and ActivityPub aim to give data owners
more control over their data and to level the playing field by enabling small companies and …
more control over their data and to level the playing field by enabling small companies and …
LUCON: Data flow control for message-based IoT systems
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the
exchange of data between services across enterprises. Traditional access and usage …
exchange of data between services across enterprises. Traditional access and usage …
Usage control specification, enforcement, and robustness: A survey
I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …
adhere to legal requirements with respect to personal data protection and copyright. Usage …