Chaari, S., Badr, Y., & Biennier, F. (2008). Enhancing web 
service selection by QoS-based ontology and WS-
policy. In Proceedings of the 2008 ACM symposium on 
Applied computing, 2426-2431. 
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access 
control model for security policy reasoning in cloud 
computing.  The Journal of Supercomputing, 67(3), 
711-722. 
Di Francesco Maesa, D., Mori, P., & Ricci, L. (2017). 
Distributed access control through blockchain 
technology,31-32. 
Garcia, D., Toledo, M. B. F., Capretz, M. A., Allison, D. S., 
Blair, G. S., Grace, P., & Flores, C. (2009). Towards a 
base ontology for privacy protection in service-oriented 
architecture. In 2009 IEEE International Conference on 
Service-Oriented Computing and Applications 
(SOCA),1-8.  
Hendrikx, F., Bubendorfer, K., & Chard, R. (2015). 
Reputation systems: A survey and taxonomy. Journal 
of Parallel and Distributed Computing, 75, 184-197. 
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., & Walter, 
T. (2007). A policy language for distributed usage 
control. In European Symposium on Research in 
Computer Security, 531-546. 
Hu, Y. J., Guo, H. Y., & Lin, G. D. (2008). Semantic 
enforcement of privacy protection policies via the 
combination of ontologies and rules. In 2008 IEEE 
International Conference on Sensor Networks, 
Ubiquitous, and Trustworthy Computing, 400-407. 
ISO, IEC. (2004). information technology–multimedia 
framework (MPEG-21) Part 5: Rights Expression 
Language.  International Organization for 
standardization.  
Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust 
and reputation systems for online service provision. 
Decision support systems, 43(2), 618-644. 
Kaaniche, N., & Laurent, M. (2017). A blockchain-based 
data usage auditing architecture with enhanced privacy 
and availability. In 2017 IEEE 16th International 
Symposium on Network Computing and Applications 
(NCA), 1-5. 
Kelbert, F., & Pretschner, A. (2013). Data usage control 
enforcement in distributed systems. In Proceedings of 
the third ACM conference on Data and application 
security and privacy, 71-82. 
Kim, A., Luo, J., & Kang, M. (2005). Security ontology for 
annotating resources. In OTM Confederated 
International Conferences" On the Move to Meaningful 
Internet Systems",1483-1499. 
Kumari, P., Pretschner, A., Peschla, J., & Kuhn, J. M. 
(2011). Distributed data usage control for web 
applications: a social network implementation. In 
Proceedings of the first ACM conference on Data and 
application security and privacy,85-96. 
Liu, C. L. (2014). Cloud service access control system 
based on ontologies. Advances in Engineering 
Software, 69, 26-36. 
Masoumzadeh, A., & Joshi, J. (2010). Osnac: An ontology-
based access control model for social networking 
systems. In 2010 IEEE Second International 
Conference on Social Computing, 751-759.  
Neisse, R., Steri, G., & Nai-Fovino, I. (2017). A 
blockchain-based approach for data accountability and 
provenance tracking. In Proceedings of the 12th 
International Conference on Availability, Reliability 
and Security 1-10
. 
Nejdl, W., Olmedilla, D., Winslett, M., & Zhang, C. C. 
(2005). Ontology-based policy specification and 
management. In European Semantic Web Conference, 
290-302. 
Open Mobile Alliance. (2008.) DRM Rights Expression 
Language V2.1. http://www.openmobilealliance.org/ 
release/DRM/V2_1-20080805-C/OMA-TS-DRM_RE 
L-V2_120080805-C.pdf,1-68. 
Panahifar, F., Byrne, P. J., Salam, M. A., & Heavey, C. 
(2018). Supply chain collaboration and firm’s 
performance.  Journal of Enterprise Information 
Management, 31(3), 358-379. 
Park, J., & Sandhu, R. (2004). The UCONABC usage 
control model. ACM Transactions on Information and 
System Security, 7(1), 128-174. 
Pretschner, A., Hilty, M., & Basin, D. (2006). Distributed 
usage control. Communications of the ACM, 49(9), 39-
44. 
Pretschner, A., Lovat, E., & Büchler, M. (2011). 
Representation-independent data usage control. In Data 
Privacy Management and Autonomous Spontaneus 
Security,122-140. 
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. 
E. (1996). Role-based access control models. 
Computer, 29(2), 38-47. 
Truong, N. B., Sun, K., Lee, G. M., & Guo, Y. (2019). 
GDPR-compliant personal data management: A 
blockchain-based solution. arXiv preprint 
arXiv:1904.03038. 
Tsai, W. T., & Shao, Q. (2011). Role-based access-control 
using reference ontology in clouds. In 2011 Tenth 
International Symposium on Autonomous 
Decentralized Systems, 121-128. 
Wang, L., Wijesekera, D., & Jajodia, S. (2004). A logic-
based framework for attribute-based access control. In 
Proceedings of the 2004 ACM workshop on Formal 
methods in security engineering 45-55. 
Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, 
A., & Mendling, J. (2016). Untrusted business process 
monitoring and execution using blockchain. In 
International Conference on Business Process 
Management 329-347. 
Wirth, C., & Kolain, M. (2018). Privacy by blockchain 
design: a blockchain-enabled GDPR-compliant 
approach for handling personal data. In Proceedings of 
1st ERCIM Blockchain Workshop 2018. European 
Society for Socially Embedded Technologies 
(EUSSET). 
Zhang, X., Park, J., Parisi-Presicce, F., & Sandhu, R. 
(2004). A logical specification for usage control. In 
Proceedings of the ninth ACM symposium on Access 
control models and technologies, 1-10.