CC BY 4.0Wagner, Paul GeorgPaul GeorgWagner2022-03-1428.7.20212021https://publica.fraunhofer.de/handle/publica/41159210.5445/IR/1000135222Given the ubiquity of data acquisition and processing in our everyday life, protecting data sovereignty in distributed systems is a significant topic of research. Usage control and provenance tracking systems are very promising steps towards a technical solution for the problem of data sovereignty. However, due to their complexity and diversity these systems are still not fully understood. In this work we investigate the functionality of usage control and provenance tracking systems. We classify them into three different categories based on their security goals and properties. Furthermore we identify generic use cases for these systems that help to understand what attack vectors system operators have to be mindful of.en004670Classifying Usage Control and Data Provenance Architecturesconference paper