REFERENCES
Ahn, G.-J. and Sandhu, R. (2000). Role-Based Authoriza-
tion Constraints Specification. ACM Transactions on
Information and System Security, Vol. 3, No. 4.
Attard, J., Scerri, S., Rivera, I., and Handschuh, S.
(2013). Ontology-based situation recognition for
context-aware systems. In Proceedings of the 9th In-
ternational Conference on Semantic Systems, pages
113–120. ACM.
Beimel, D. and Peleg, M. (2011). Using OWL and SWRL to
represent and reason with situation-based access con-
trol policies. Data & Knowledge Engineering, Vol.
70, Issue 6.
Brumitt, B., Meyers, B., Krumm, J., Kern, A., and Shafer,
S. (2000). EasyLiving: Technologies for Intelligent
Environments. In Handheld and Ubiquitous Comput-
ing. Springer Berlin Heidelberg.
Dargie, W., Mendez, J., Mobius, C., Rybina, K., Thost, V.,
Turhan, A.-Y., et al. (2013). Situation Recognition for
Service Management Systems Using OWL 2 Reason-
ers. In Proceedings of the 10th IEEE Workshop on
Context Modeling and Reasoning 2013, pages 31–36.
IEEE Computer Society.
Ferraiolo, D., Kuhn, R., and Hu, V. (2015). Attribute-Based
Access Control. In Computer, Vol.48. IEEE Computer
Society.
Franco da Silva, A. C., Hirmer, P., Wieland, M., and
Mitschang, B. (2016). SitRS XT – Towards Near Real
Time Situation Recognition. Journal of Information
and Data Management.
Glombiewski, N., Hoßbach, B., Morgen, A., Ritter, F., and
Seeger, B. (2013). Event Processing on your own
Database. In BTW workshops, pages 33–42.
Hasan, S., Curry, E., Banduk, M., and O’Riain, S. (2011).
Toward Situation Awareness for the Semantic Sen-
sor Web: Complex Event Processing with Dynamic
Linked Data Enrichment. SSN, 839:69–81.
H
¨
aussermann, K., Hubig, C., Levi, P., Leymann, F., Si-
moneit, O., Wieland, M., and Zweigle, O. (2010).
Understanding and designing situation-aware mobile
and ubiquitous computing systems. Proc. of intern.
Conf. on Mobile, Ubiquitous and Pervasive Comput-
ing, pages 329–339.
Hirmer, P., Wieland, M., Breitenb
¨
ucher, U., and Mitschang,
B. (2016a). Automated Sensor Registration, Binding
and Sensor Data Provisioning. In Proceedings of the
CAiSE’16 Forum, at the 28th International Confer-
ence on Advanced Information Systems Engineering
(CAiSE 2016).
Hirmer, P., Wieland, M., Breitenb
¨
ucher, U., and Mitschang,
B. (2016b). Dynamic Ontology-based Sensor Bind-
ing. In Advances in Databases and Information Sys-
tems. 20th East European Conference, ADBIS 2016,
Prague, Czech Republic, August 28-31, 2016, Pro-
ceedings, volume 9809 of Information Systems and
Applications, incl. Internet/Web, and HCI. Springer
International Publishing.
Hirmer, P., Wieland, M., Schwarz, H., Mitschang, B., Bre-
itenb
¨
ucher, U., and Leymann, F. (2015). SitRS - A
Situation Recognition Service based on Modeling and
Executing Situation Templates. In Barzen, J., Kha-
laf, R., Leymann, F., and Mitschang, B., editors, Pro-
ceedings of the 9th Symposium and Summer School
On Service-Oriented Computing, volume RC25564 of
Technical Paper. IBM Research Report.
H
¨
uffmeyer, M. and Schreier, U. (2016a). Analysis of an
Access Control System for RESTful Services. ICWE
’16 - International Conference on Web Engineering.
H
¨
uffmeyer, M. and Schreier, U. (2016b). Formal Compar-
ison of an Attribute Based Access Control Language
for RESTful Services with XACML. SACMAT ’16 -
Symposium on Access Control Models and Technolo-
gies.
H
¨
uffmeyer, M. and Schreier, U. (2016c). RestACL - An At-
tribute Based Access Control Language for RESTful
Services. ABAC ’16 - Proceedings of the 1st Workshop
on Attribute Based Access Control.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A Uni-
fied Attribute-Based Access Control Model Covering
DAC, MAC and RBAC. DBSec ’12 - Proceedings of
the 26th Annual Conference on Data and Applications
Security and Privacy.
Peleg, M., Beimel, D., Dorib, D., and Denekamp, Y. (2008).
Situation-Based Access Control: Privacy manage-
ment via modeling of patient data access scenarios.
Journal of Biomedical Informatics, Vol. 41, Issue 6.
Ramli, C. D. P. K., Nielson, H. R., and Nielson, F. (2012).
The Logic of XACML. In Lecture Notes in Com-
puter Science - Formal Aspects of Component Soft-
ware. Springer.
Wang, X., Zhang, D. Q., Gu, T., and Pung, H. (2004). On-
tology Based Context Modeling and Reasoning Us-
ing OWL. In Proceedings of the Second IEEE Annual
Conference on Pervasive Computing and Communi-
cations Workshops. IEEE Computer Society.
Wieland, M., Schwarz, H., Breitenb
¨
ucher, U., and Ley-
mann, F. (2015). Towards Situation-Aware Adaptive
Workflows. In Proceedings of the 13th Annual IEEE
Intl. Conference on Pervasive Computing and Com-
munications Workshops: 11th Workshop on Context
and Activity Modeling and Recognition. IEEE.
Yau, S. S., Yao, Y., and Banga, V. (2005). Situation-aware
access control for service-oriented autonomous de-
centralized systems. In Proceedings of the 2005 In-
ternational Symposium on Autonomous Decentralized
Systems, ISADS ’05.
Yazar, A., Erden, F., and Cetin, A. E. (2014). Multi-
sensor ambient assisted living system for fall detec-
tion. In Proceedings of the IEEE International Con-
ference on Acoustics, Speech, and Signal Processing
(ICASSP14), pages 1–3. Citeseer.
Yuan, E. and Tong, J. (2005). Attribute based access control
(ABAC) for Web services. ICWS ’05 - International
Conference on Web Services.
SitAC – A System for Situation-aware Access Control - Controlling Access to Sensor Data
125