Elkhodary, A. and Whittle, J. (2007). A survey of ap-
proaches to adaptive application security. In Proceed-
ings of the 2007 International Workshop on Software
Engineering for Adaptive and Self-Managing Systems,
page 16. IEEE Computer Society.
Evesti, A. and Ovaska, E. (2013). Comparison of adaptive
information security approaches. ISRN Artificial In-
telligence, 2013.
Fenz, S. and Ekelhart, A. (2009). Formalizing informa-
tion security knowledge. Proceedings of the 4th Inter-
national Symposium on Information, Computer, and
Communications Security - ASIACCS ’09, page 183.
Frye, L., Cheng, L., and Heflin, J. (2012). An ontology-
based system to identify complex network attacks.
IEEE International Conference on Communications,
pages 6683–6688.
Garc
´
ıa-Crespo,
´
A., G
´
omez-Berb
´
ıs, J. M., Colomo-Palacios,
R., and Alor-Hern
´
andez, G. (2011). Securontology:
A semantic web access control framework. Computer
Standards & Interfaces, 33(1):42–49.
Granjal, J., Monteiro, E., and Silva, J. S. (2014). Security
in the integration of low-power wireless sensor net-
works with the internet: A survey. Ad Hoc Networks,
24:264–287.
Gyrard, A., Bonnet, C., and Boudaoud, K. (2014). An
ontology-based approach for helping to secure the etsi
machine-to-machine architecture. IEEE International
Conference on Internet of Things 2014 (iThings).
Habib, K. and Leister, W. (2013). Adaptive security for
the internet of things reference model. Norsk infor-
masjonssikkerhetskonferanse (NISK), pages 13–25.
Herzog, A., Shahmehri, N., and Duma, C. (2007). An on-
tology of information security. Journal of Information
Security, 1(4):1–23.
Kalyanpur, A., Pastor, D. J., Battle, S., and Padget, J. A.
(2004). Automatic mapping of owl ontologies into
java. In SEKE, volume 4, pages 98–103. Citeseer.
Kim, A., Luo, J., and Kang, M. (2005). Security ontol-
ogy for annotating resources. In On the Move to
Meaningful Internet Systems 2005: CoopIS, DOA,
and ODBASE, pages 1483–1499.
Laddaga, R. and Robertson, P. (2004). Self adaptive soft-
ware : A position paper. SELF-STAR: International
Workshop on Self-* Properties in Complex Informa-
tion Systems, 19:31.
Mouratidis, H. (2006). Integrating Security and Software
Engineering: Advances and Future Visions: Advances
and Future Visions. IGI Global.
Mozzaquatro, B. A., Jardim-goncalves, R., and Agostinho,
C. (2015). Towards a reference ontology for security
in the internet of things. In IEEE International Work-
shop on Measurement and Networking, pages 1–6.
Picek, R. and Strahonja, V. (2007). Model driven
development-future or failure of software develop-
ment. In IIS, volume 7, pages 407–413.
Roman, R., Zhou, J., and Lopez, J. (2013). On the features
and challenges of security and privacy in distributed
internet of things. Computer Networks, 57(10):2266–
2279.
Shnitko, A. (2003). Adaptive security in complex informa-
tion systems. In Science and Technology, 2003. Pro-
ceedings KORUS 2003. The 7th Korea-Russia Inter-
national Symposium on, pages 206–210.
Sicari, S., Rizzardi, a., Grieco, L., and Coen-Porisini, a.
(2014). Security, privacy and trust in internet of
things: The road ahead. Computer Networks, 76:146–
164.
Soylu, A. and De Causmaecker, P. (2009). Merging model
driven and ontology driven system development ap-
proaches pervasive computing perspective. In Com-
puter and Information Sciences, 2009. ISCIS 2009.
24th International Symposium on, pages 730–735.
IEEE.
Stoneburner, G., Goguen A. Y., and Feringa, A. (2002). Sp
800-30. risk management guide for information tech-
nology systems.
Undercoffer, J., Joshi, A., and Pinkston, J. (2003). Model-
ing computer attacks : An ontology for intrusion de-
tection. pages 113–135.
Xu, H., Xiao, D., and Wu, Z. (2009). Application of se-
curity ontology to context-aware alert analysis. 2009
Eighth IEEE/ACIS International Conference on Com-
puter and Information Science, pages 171–176.
Xu, L. D., He, W., and Li, S. (2014). Internet of things in
industries: A survey. IEEE Transactions on Industrial
Informatics, 10(4):2233–2243.
Yan, Z., Zhang, P., and Vasilakos, A. V. (2014). A survey
on trust management for internet of things. Journal of
Network and Computer Applications, 42(2):120–134.
MDE4SI 2016 - Special Session on Model-Driven Enterprise Services and Applications for a Sustainable Interoperability: New Paradigms
for Development in the Future Enterprise - 2nd Edition
788