2 New Exciting Position Papers
now Published!

Usa­ge Con­trol in the Inter­na­tio­nal Data Spaces

This report focu­ses on data usa­ge con­trol and data pro­ven­an­ce, that are con­cep­tu­al, and tech­no­lo­gi­cal solu­ti­ons to cope with data sover­eig­n­ty chal­len­ges. It intro­du­ces a com­mon sce­n­a­rio for the Indus­try 4.0 age, in which a sup­plier and an ori­gi­nal equip­ment manu­fac­tu­rer (OEM) are exch­an­ging data to miti­ga­te risks in the sup­ply chain manage­ment. It descri­bes the dif­fe­rence bet­ween access con­trol and usa­ge con­trol, the usa­ge con­trol con­cepts and rela­ted con­cepts such as digi­tal rights manage­ment or user-mana­ged access.

This report pres­ents the imple­men­ta­ti­on of data usa­ge con­trol in the IDS. In doing so, it pres­ents the poli­cy lan­guage, its inte­gra­ti­on to the IDS infor­ma­ti­on model and intro­du­ces com­mon­ly used poli­ci­es. Thus, pre­sen­ting a poli­cy edi­tor for expres­sing usa­ge restric­tions in the open digi­tal rights lan­guage and their trans­for­ma­ti­on to machi­ne-read­a­ble poli­ci­es.

IDS Cer­ti­fi­ca­ti­on Exp­lai­ned

The Cer­ti­fi­ca­ti­on of the Inter­na­tio­nal Data Spaces is of fun­da­men­tal impor­t­an­ce for IDS and one of its core com­pon­ents.

Trust is the basis for a suc­cess­ful col­la­bo­ra­ti­on bet­ween part­ners, in busi­ness as well as in soci­al life. Due to the impor­t­an­ce of col­la­bo­ra­ti­on for the IDS, cer­ti­fi­ca­ti­on works as an enab­ler for busi­ness and use cases. Col­la­bo­ra­ti­on is the basis for the IDS its­elf and the­re­fo­re, it is necessa­ry to estab­lish trust by cer­ti­fi­ca­ti­on bet­ween the part­ners in IDS.

The pur­po­se of this paper is to pre­sent the IDS Cer­ti­fi­ca­ti­on Sche­me in a short and com­pre­hen­si­ble form. The paper will out­line the dif­fe­rent eva­lua­ti­on levels, cer­ti­fi­ca­ti­on cri­te­ria and the major steps of a cer­ti­fi­ca­ti­on pro­cess from the point of view of the app­li­cant.