presented in Sections 3 and 4. It is the responsibility
of such a mechanism to ensure that this
extension/instantiation takes place according to a set
of predefined governance policies. In the future, we
intend to investigate the construction of a higher-level
ontological framework that will generically
accommodate these governance policies and thus
pave the way for the construction of a generic
customisation mechanism that can be easily adapted
to the particular needs of the potential adopter of our
framework.
ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the European Union’s Horizon 2020
research and innovation programme under grant
agreement No 644814. The authors would like to
thank the partners of the PaaSword project
(www.paasword.eu) for their valuable advices and
comments.
REFERENCES
Abowd, G., & Mynatt, E., 2000. Charting past, present, and
future research in ubiquitous computing. ACM
Transactions on Computer-Human Interaction
(TOCHI) - Special issue on human-computer
interaction in the new millennium, 29-58.
Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J.,
Nicklas, D., Ranganathan, A., & Riboni, D., 2010. A
survey of context modelling and reasoning techniques.
Pervasive and Mobile Computing, 161-180.
Bucchiarone, A., Kazhamiakin, R., Cappiello, C., Nitto, E.,
& Mazza, V., 2010. A context-driven adaptation
process for service-based applications. In ACM
Proceedings of the 2nd International Workshop on
Principles of Engineering Service-Oriented Systems
(PESOS'10), pp. 50-56, Cape Town, South Africa.
Cisco, 2011. Cloud: What an Enterprise Must Know, Cisco
White Paper.
CSA, 2013. The Notorious Nine. Cloud Computing Top
Threats in 2013. Cloud Security Alliance.
Dey, A. K., 2001. Understanding and Using Context. In
Personal and Ubiquitous Computing Journal, vol. 5, no.
1, p. 4-7.
Ferrari, E., 2010. Access Control in Data Management
Systems. Synthesis Lectures on Data Management,
Morgan & Claypool, Vol. 2, No. 1, p. 1-117.
Group, T. T., 2013. The Notorious Nine. Cloud Computing
Top Threats in 2013. Cloud Security Aliance (CSA).
Heupel, M., Fischer, L., Bourimi, M., Kesdogan, D., Scerri,
S., Hermann, F., Gimenez, R., 2012. Context-Aware,
Trust-Based Access Control for the di.me Userware. In
Proceedings of the 5th International Conference on
New Technologies, Mobility and Security (NTMS'12),
pp. 1-6, Istanbul, Turkey, IEEE Computer Society.
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin,
K., Miller R., and Scarfone K., 2014. Guide to Attribute
Based Access Control (ABAC) Definition and
Considerations. NIST.
Hu, H., Ahn, G.-J. and Kulkarni, K., 2011. Ontology-based
policy anomaly management for autonomic computing.
In 7th International Conference on Collaborative
Computing: Networking, Applications and
Worksharing (CollaborateCom).
Jung, C., Eitel, A., Schwarz, R., 2014. Cloud Security with
Context-aware Usage Control Policies. In Proceedings
of the INFORMATIK'14 Conference, pp. 211-222.
Kagal, L., Finin, T. and Joshi, A., 2003. A Policy Language
for a Pervasive Computing Environment. In 4th IEEE
Int. Workshop on Policies for Distributed Systems and
Networks (POLICY '03).
Linked USDL, 2014. Available online: http://linked-
usdl.org/.
Micro, T., 2010. The Need for Cloud Computing Security.
Trend Micro.
Miele, A., Quintarelli, E., Tanca, L., 2009. A methodology
for preference-based personalization of contextual data.
In ACM Proceedings of the 12th International
Conference on Extending Database Technology:
Advances in Database Technology (EDBT'09), pp. 287-
298, Saint-Petersburg, Russia.
NIST, 2011. Cloud Computing Reference Architecture,
National Institute of Standards and Technology.
OASIS, 2013.
OASIS eXtensible Access Control Markup
Language (XACML). Available: http://docs.oasis-
open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
OWL Web Ontology Language Reference. W3C
Recommendation, 2004. Available online:
http://www.w3.org/TR/owl-ref/.
Pedrinaci, C., Cardoso, J. and Leidig, T., 2014. Linked
USDL: a Vocabulary for Web-scale Service Trading. In
11th Extended Semantic Web Conference (ESWC).
Specification of Deliberation RuleML 1.01, 2015.
Available online: http://wiki.ruleml.org/index.php/
Specification_of_Deliberation_RuleML_1.01.
Security Assertions Markup Language (SAML) Version
2.0. Technical Overview, 2008. Available online:
https://www.oasis-open.org/committees/download.
php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf
Sheng, Q., & Benatallah, B., 2005. ContextUML: A UML-
Based Modeling Language for Model-Driven
Development of Context-Aware Web Services
Development. In Proceedings of the International
Conference on Mobile Business (ICMB'05), pp. 206-
212, IEEE Computer Society.
Strang, T., Linnhoff-Popien, C., 2004. A Context Modeling
Survey. In Workshop on Advanced Context Modelling,
Reasoning and Management, (UbiComp'04) - The
Sixth International Conference on Ubiquitous
Computing. Nottingham, England.
Truong, H.-L., Manzoor, A., Dustdar, S., 2009. On
modeling, collecting and utilizing context information