Cited By
View all- Zrenner JMöller FJung CEitel AOtto B(2019)Usage control architecture options for data sovereignty in business ecosystemsJournal of Enterprise Information Management10.1108/JEIM-03-2018-005832:3(477-495)Online publication date: 4-Jun-2019
- Kelbert FPretschner A(2018)Data Usage Control for Distributed SystemsACM Transactions on Privacy and Security10.1145/318334221:3(1-32)Online publication date: 16-Apr-2018
- Basin DDebois SHildebrandt T(2018)On Purpose and by Necessity: Compliance Under the GDPRFinancial Cryptography and Data Security10.1007/978-3-662-58387-6_2(20-37)Online publication date: 7-Dec-2018
- Show More Cited By