Foundational Components for B2B Data Sharing Using the Solid Protocol
Gorde:
| Argitaratua izan da: | Journal of Web Engineering vol. 24, no. 4 (2025), p. 593-635 |
|---|---|
| Egile nagusia: | |
| Beste egile batzuk: | , , , , , , |
| Argitaratua: |
River Publishers
|
| Gaiak: | |
| Sarrera elektronikoa: | Citation/Abstract Full Text Full Text - PDF |
| Etiketak: |
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3242887738 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1540-9589 | ||
| 022 | |a 1544-5976 | ||
| 024 | 7 | |a 10.13052/jwe1540-9589.2445 |2 doi | |
| 035 | |a 3242887738 | ||
| 045 | 2 | |b d20250520 |b d20250630 | |
| 100 | 1 | |a Both, Andreas | |
| 245 | 1 | |a Foundational Components for B2B Data Sharing Using the Solid Protocol | |
| 260 | |b River Publishers |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a This article introduces foundational components for decentralized B2B data sharing based on the solid protocol, emphasizing data sovereignty, security, and interoperability.These components are: (1) Authorization app (AuthApp) – facilitating granular control and compliance in access granting and revocation processes; (2) rights delegation proxy (RDP) – supporting controlled delegation of rights, enabling natural persons to act on behalf of organizations while ensuring privacy and traceability; (3) data provisioning proxy (DPP) – allowing seamless and secure data provisioning across organizations while masking the identity of upstream data sources to protect business interests.The components enable the creation of end-to-end, standards-based, flexible data value chains. We validate their applicability through a real-world financial services use case involving loan processing, which illustrates data sharing and protection challenges in B2B ecosystems. | |
| 653 | |a Interoperability | ||
| 653 | |a Information sharing | ||
| 653 | |a Resource Description Framework-RDF | ||
| 653 | |a Protocol | ||
| 653 | |a Organizational structure | ||
| 653 | |a Access control | ||
| 653 | |a Organizations | ||
| 653 | |a Provisioning | ||
| 653 | |a Value engineering | ||
| 653 | |a Interfaces | ||
| 653 | |a Value chain | ||
| 700 | 1 | |a Kastner, Thorsten | |
| 700 | 1 | |a Yeboah, Dustin | |
| 700 | 1 | |a Braun, Christoph | |
| 700 | 1 | |a Schraudner, Daniel | |
| 700 | 1 | |a Schmid, Sebastian | |
| 700 | 1 | |a Käfer, Tobias | |
| 700 | 1 | |a Harth, Andreas | |
| 773 | 0 | |t Journal of Web Engineering |g vol. 24, no. 4 (2025), p. 593-635 | |
| 786 | 0 | |d ProQuest |t Computer Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3242887738/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3242887738/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3242887738/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |