
their requirements.
• Trust Anchors: Every attribute that is specified by
a policy must be verifiable. For this purpose, of-
ten, third-party systems are integrated. For exam-
ple, a policy may specify that data can only be
accessed by participants of a specific dataspace.
As part of the identity management, the member-
ship proof would be obtained on the sender side
and checked on the receiver side. A decentralised
approach avoids relying on a central system. In-
stead, each data sharing participant can decide
individually which third-party system or vendor
they consider trustworthy for the validation of in-
coming information (not restricted to identities).
As illustrated in Figure 5 and indicated in Fig-
ure 6, some elicitation and analysis steps take place
in isolation, while others are collaborative. For
example, an essential part of the RE process for
sovereign data sharing is aggregating requirements
from different stakeholders, thus resolving potential
conflicts. Finally, the resulting requirements may
lead to sovereignty-specific software features of a data
sharing system (Pampus and Heisel, 2025b).
3 DISCUSSION & FUTURE
WORK
Addressing our RQ, a systematic RE process facil-
itates interoperable policy enforcement by enabling
(1) a syntactic alignment of policies and (2) seman-
tic equivalence by means of describing the environ-
ment (points of validation, trust anchors), regardless
of the underlying policy language and architecture.
This forms an essential basis for conceptual interop-
erability (cf. Section 1.1). A model-based approach
helps understanding the key mechanisms of establish-
ing sovereignty in data sharing, gathering required
contextual information, and making them processable
and reusable.
In general, such an RE process can be used for
designing data sharing systems, but also supporting
the onboarding of new participating organisations in
a dataspace. Overall, a pattern-based approach allows
for reusing requirements of all types in various data
sharing use cases. In decentralised ecosystems, im-
plementation is nevertheless challenging: In the sim-
plest case, a system would need to map syntactic rules
and their semantics. For this purpose, a centralised or
decentralised policy registry could provide informa-
tion about policy validation points and trust anchors.
The definition of shared trust anchors forms an es-
sential part of trust between data sharing participants.
In this work, the focus of our design framework and
the presented RE process has been on establishing in-
teroperability. However, data sovereignty is also pri-
marily about trust (Lohm
¨
oller et al., 2022; Hellmeier
et al., 2023). For this reason, it is essential to iden-
tify which other aspects are part of a trust model and
which technical interfaces need to be designed ac-
cordingly. The results of this elaboration can then be
used to derive additional requirements.
ACKNOWLEDGEMENTS
This work was partially supported by the German
Federal Ministry for Economic Affairs and Climate
Action (funding number: 13IK040F).
REFERENCES
Akaichi, I. and Kirrane, S. (2022). Usage Control Specifi-
cation, Enforcement, and Robustness: A Survey.
ˇ
Cu
ˇ
cko,
ˇ
S. and Turkanovi
´
c, M. (2021). Decentralized and
self-sovereign identity: Systematic mapping study.
IEEe Access, 9:139009–139027.
European Commission (2025). Common Eu-
ropean Data Spaces. https://digital-
strategy.ec.europa.eu/en/policies/data-spaces.
Hellmeier, M., Pampus, J., Qarawlus, H., and Howar, F.
(2023). Implementing Data Sovereignty: Require-
ments & Challenges from Practice. In Proceedings
of the 18th International Conference on Availability,
Reliability and Security, pages 1–9.
Hosseinzadeh, A., Eitel, A., and Jung, C. (2020). A Sys-
tematic Approach toward Extracting Technically En-
forceable Policies from Data Usage Control Require-
ments. In Proceedings of the 6th International Con-
ference on Information Systems Security and Privacy,
pages 397–405.
Jarke, M., Otto, B., and Ram, S. (2019). Data Sovereignty
and Data Space Ecosystems. Business & Information
Systems Engineering, 61(5):549–550.
Jung, C. and D
¨
orr, J. (2022). Data Usage Control. In Otto,
B., ten Hompel, M., and Wrobel, S., editors, Design-
ing Data Spaces, pages 129–146. Springer Interna-
tional Publishing, Cham.
Koen, P., Kollenstart, M., Marino, J., Pampus, J., Turkmay-
ali, A., Steinbuss, S., and Weiß, A. (2025). Dataspace
Protocol 2025-1-RC1.
Lohm
¨
oller, J., Pennekamp, J., Matzutt, R., and Wehrle, K.
(2022). On the need for strong sovereignty in data
ecosystems. In DEco@ VLDB, pages 51–63.
Nilsson, B. E. (1999). On Why to Model What and
How: Concepts and Architecture for Change. In
Perspectives on Business Modelling, pages 269–303.
Springer, Berlin, Heidelberg.
Towards Consistent Policy Enforcement in Dataspaces
565