Bermudez-Edo, M., Elsaleh, T., Barnaghi, P., and Taylor, K.
(2015). Iot-lite ontology.
Bermudez-Edo, M., Elsaleh, T., Barnaghi, P., and Taylor, K.
(2016). Iot-lite: a lightweight semantic model for the
internet of things. In 2016 INTL IEEE conferences
on ubiquitous intelligence & computing, advanced
and trusted computing, scalable computing and com-
munications, cloud and big data computing, internet
of people, and smart world congress (uic/atc/scal-
com/cbdcom/iop/smartworld), pages 90–97. IEEE.
Cao, J., Carminati, B., Ferrari, E., and Tan, K.-L. (2009).
Acstream: Enforcing access control over data streams.
In 2009 IEEE 25th International Conference on Data
Engineering, pages 1495–1498. IEEE.
Carminati, B., Ferrari, E., Cao, J., and Tan, K. L. (2010).
A framework to enforce access control over data
streams. ACM Transactions on Information and Sys-
tem Security (TISSEC), 13(3):1–31.
Carminati, B., Ferrari, E., and Guglielmi, M. (2015). De-
tection of unspecified emergencies for controlled in-
formation sharing. IEEE Transactions on Dependable
and Secure Computing, 13(6):630–643.
Carminati, B., Ferrari, E., and Tan, K. L. (2007a). Enforcing
access control over data streams. In Proceedings of
the 12th ACM symposium on Access control models
and technologies, pages 21–30.
Carminati, B., Ferrari, E., and Tan, K. L. (2007b). Specify-
ing access control policies on data streams. In Interna-
tional Conference on Database Systems for Advanced
Applications, pages 410–421. Springer.
Celdr
´
an, A. H., Clemente, F. J. G., P
´
erez, M. G., and
P
´
erez, G. M. (2014). Secoman: A semantic-aware
policy framework for developing privacy-preserving
and context-aware smart applications. IEEE Systems
Journal, 10(3):1111–1124.
Chen, H., Finin, T., and Joshi, A. (2003). An ontology
for context-aware pervasive computing environments.
The knowledge engineering review, 18(3):197–207.
Choi, C., Choi, J., and Kim, P. (2014). Ontology-based
access control model for security policy reasoning in
cloud computing. The Journal of Supercomputing,
67(3):711–722.
Guo, H., Li, Y., and Jajodia, S. (2007). Chaining wa-
termarks for detecting malicious modifications to
streaming data. Inf. Sci., 177(1):281–298.
Home Assistant (2021). Open source home automation.
http://www.home-assistant.io/.
Janes, B., Crawford, H., and OConnor, T. (2020). Never
ending story: Authentication and access control de-
sign flaws in shared iot devices. In 2020 IEEE Secu-
rity and Privacy Workshops (SPW), pages 104–109.
IEEE.
Jeong, Y.-S., Lee, S.-H., and Shin, S.-S. (2014). Access
control protocol based on privacy property of patient
in m-healthcare emergency. Wireless personal com-
munications, 79(4):2565–2578.
Kolozali, S., Bermudez-Edo, M., Puschmann, D., Ganz,
F., and Barnaghi, P. (2014). A knowledge-based ap-
proach for real-time iot data stream annotation and
processing. In 2014 IEEE International Conference
on Internet of Things (iThings), and IEEE Green Com-
puting and Communications (GreenCom) and IEEE
Cyber, Physical and Social Computing (CPSCom),
pages 215–222. IEEE.
Le-Phuoc, D., Dao-Tran, M., Parreira, J. X., and Hauswirth,
M. (2011). A native and adaptive approach for unified
processing of linked streams and linked data. In Inter-
national Semantic Web Conference, pages 370–388.
Springer.
Lee, C.-C., Hsu, C.-W., Lai, Y.-M., and Vasilakos, A.
(2013). An enhanced mobile-healthcare emergency
system based on extended chaotic maps. Journal of
medical systems, 37(5):9973.
Lu, R., Lin, X., and Shen, X. (2012). Spoc: A secure and
privacy-preserving opportunistic computing frame-
work for mobile-healthcare emergency. IEEE transac-
tions on parallel and distributed systems, 24(3):614–
624.
Manogaran, G., Thota, C., Lopez, D., and Sundarasekar, R.
(2017). Big data security intelligence for healthcare
industry 4.0. In Cybersecurity for Industry 4.0, pages
103–126. Springer.
Mengke, Y., Xiaoguang, Z., Jianqiu, Z., and Jianjian, X.
(2016). Challenges and solutions of information secu-
rity issues in the age of big data. China Communica-
tions, 13(3):193–202.
Montanari, R., Toninelli, A., and Bradshaw, J. M. (2005).
Context-based security management for multi-agent
systems. In IEEE 2nd Symposium on Multi-Agent Se-
curity and Survivability, 2005., pages 75–84. IEEE.
Nambiar, S., Kalambur, S., and Sitaram, D. (2020). Model-
ing access control on streaming data in apache storm.
Procedia Computer Science, 171:2734–2739.
Nehme, R. V., Lim, H.-S., and Bertino, E. (2013). Fence:
Continuous access control enforcement in dynamic
data stream environments. In Proceedings of the third
ACM conference on Data and application security and
privacy, pages 243–254.
Nehme, R. V., Rundensteiner, E. A., and Bertino, E. (2008).
A security punctuation framework for enforcing ac-
cess control on streaming data. In 2008 IEEE 24th
International Conference on Data Engineering, pages
406–415. IEEE.
Penrig, A., Song, D., and Tygar, D. (2000). Elk, a new
protocol for efficient large-group key distribution. In
Proceedings 2001 IEEE Symposium on Security and
Privacy. S&P 2001, pages 247–262. IEEE.
Powell, J., Menon, D., and Jones, J. (1996). The effects of
hypoxaemia and recommendations for postoperative
oxygen therapy. Anaesthesia, 51(8):769–772.
Preuveneers, D., Van den Bergh, J., Wagelaar, D., Georges,
A., Rigole, P., Clerckx, T., Berbers, Y., Coninx, K.,
Jonckers, V., and De Bosschere, K. (2004). Towards
an extensible context ontology for ambient intelli-
gence. In European Symposium on Ambient Intelli-
gence, pages 148–159. Springer.
Puthal, D., Nepal, S., Ranjan, R., and Chen, J. (2015). A
dynamic key length based approach for real-time se-
curity verification of big sensing data stream. In Inter-
Stream Data Access Control Model: The Need for Data Semantics
29