Simple record

dc.rights.licenseAttribution 4.0 International*
dc.contributor.authorLarrinaga, Felix
dc.contributor.editorUsländer, Thomas
dc.contributor.otherDalmolen, Simon
dc.contributor.otherDrost, Michaela
dc.contributor.otherFirouzi, Farshad
dc.contributor.otherLangdon, Christoph Schlüter
dc.contributor.otherMarguglio, Angelo
dc.contributor.otherMitani, Koki
dc.contributor.otherNakashima, Kazuo
dc.contributor.otherOtsuka, Kazuhisa
dc.contributor.otherRiedlinger, Marc
dc.contributor.otherRössl, Bastian
dc.contributor.otherSakaino, Akira
dc.contributor.otherStojanovic, Ljiljana
dc.contributor.otherTeuscher, Andreas
dc.contributor.otherUlloa, Michel Iñigo
dc.contributor.otherVolz, Friedrich
dc.date.accessioned2022-11-17T12:04:39Z
dc.date.available2022-11-17T12:04:39Z
dc.date.issued2022
dc.identifier.otherhttps://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=167839en
dc.identifier.urihttps://hdl.handle.net/20.500.11984/5853
dc.description.abstractThe increasing digitization in the manufacturing industry within and between production companies raises the question of secure and interoperable data sharing between companies in virtual enterprises or between enterprises that work together for joint businesses. Although there is a wish to share data, there is a clear request to keep the control over the usage of data by the distributing entity throughout the whole usage phase of that data by other entities. However, data sovereignty and especially data usage control is a complex and multi-faceted aspect of data sharing infrastructure and difficult to enforce in a truly distributed environment. Hence, there is a need to analyze the concrete needs for data usage control and to set priorities motivated by user requirements.en
dc.format.extent52 p.en
dc.language.isoengen
dc.publisherInternational Data Spaces Associationen
dc.rights© 2022 International Data Spaces Association, Dortmunden
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectData Analysisen
dc.subjectcontroles
dc.titleData Sovereignty - Requirements Analysis of Manufacturing Use Casesen
dcterms.accessRightshttp://purl.org/coar/access_right/c_abf2en
local.contributor.groupIngeniería del software y sistemases
local.description.peerreviewedtrueen
local.identifier.doihttps://internationaldataspaces.org//wp-content/uploads/IDSA-Position-Paper-Data-Sovereignty-Requirements-Analysis-of-Manufacturing-Use-Cases.pdfen
local.contributor.otherinstitutionhttps://ror.org/00fxswh37es
local.contributor.otherinstitutionTNOes
local.contributor.otherinstitutionDeutsche Telekom T-Systemsde
local.contributor.otherinstitutionAdvaneo GmbHde
local.contributor.otherinstitutionEngineering Ingegneria Informatica S.p.A.es
local.contributor.otherinstitutionNTT Dataen
local.contributor.otherinstitutionInvestigación e Innovación Responsables (RRI)es
local.contributor.otherinstitutionFraunhofer IOSB-INAde
local.contributor.otherinstitutionhttps://ror.org/01zx97922de
oaire.format.mimetypeapplication/pdf
oaire.file$DSPACE\assetstore
oaire.resourceTypehttp://purl.org/coar/resource_type/c_2f33en


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Simple record

Attribution 4.0 International
Except where otherwise noted, this item's license is described as Attribution 4.0 International