ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the European Union’s Horizon 2020
research and innovation programme under grant
agreement No 644814.
REFERENCES
Abowd, G., & Mynatt, E., 2000. Charting past, present, and
future research in ubiquitous computing. ACM
Transactions on Computer-Human Interaction (TOCHI) -
Special issue on human-computer interaction in the new
millennium, 29-58.
Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J.,
Nicklas, D., Ranganathan, A., & Riboni, D., 2010. A
survey of context modelling and reasoning techniques.
Pervasive and Mobile Computing, 161-180.
Bucchiarone, A., Kazhamiakin, R., Cappiello, C., Nitto, E., &
Mazza, V., 2010. A context-driven adaptation process for
service-based applications. In ACM Proceedings of the
2nd International Workshop on Principles of Engineering
Service-Oriented Systems (PESOS'10), pp. 50-56, Cape
Town, South Africa.
CSA, 2015. What’s Hindering the Adoption of Cloud
Computing in Europe? Available online:
https://blog.cloudsecurityalliance.org/2015/09/15/whats-
hindering-the-adoption-of-cloud-computing-in-europe/.
Cloud Security Alliance.
Heupel, M., Fischer, L., Bourimi, M., Kesdogan, D., Scerri,
S., Hermann, F., Gimenez, R., 2012. Context-Aware,
Trust-Based Access Control for the di.me Userware. In
Proceedings of the 5th International Conference on New
Technologies, Mobility and Security (NTMS'12), pp. 1-6,
Istanbul, Turkey, IEEE Computer Society.
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K.,
Miller R., and Scarfone K., 2014. Guide to Attribute
Based Access Control (ABAC) Definition and
Considerations. NIST.
Kagal, L., Finin, T., Joshi, A.: A Policy Language for a
Pervasive Computing Environment. In 4th IEEE Int.
Workshop on Policies for Distributed Systems and
Networks (POLICY '03), pp. 63-74, IEEE Computer
Society, Washington, DC (2003)
Miele, A., Quintarelli, E., Tanca, L., 2009. A methodology for
preference-based personalization of contextual data. In
ACM Proceedings of the 12th International Conference
on Extending Database Technology: Advances in
Database Technology (EDBT'09), pp. 287-298, Saint-
Petersburg, Russia.
Nejdl, W., Olmedilla, D., Winslett, M, Zhang. C.C.:
Ontology-Based policy specification and management. In
Gómez-Pérez, A. and Euzenat, J. (eds.) ESWC'05, pp.
290-302, Springer-Verlag, Berlin, Heidelberg (2005).
OASIS, 2013. OASIS eXtensible Access Control Markup
Language (XACML). Available: http://docs.oasis-
open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
OWL Web Ontology Language Reference. W3C
Recommendation, 2004. Available online:
http://www.w3.org/TR/owl-ref/.
PaaSword Deliverable 2.1, 2015. Available online:
https://www.paasword.eu/deliverables/.
PaaSword Deliverable 2.2, 2015. Available online:
https://www.paasword.eu/deliverables/.
RDF 1.1 Turtle, 2014. Available: http://docs.oasis-
open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
Specification of Deliberation RuleML 1.01, 2015. Available
online:
http://wiki.ruleml.org/index.php/Specification_of_Deliber
ation_RuleML_1.01.
Security Assertions Markup Language (SAML) Version 2.0.
Technical Overview, 2008. Available online:
https://www.oasis-
open.org/committees/download.php/27819/sstc-saml-
tech-overview-2.0-cd-02.pdf
Sheng, Q., & Benatallah, B., 2005. ContextUML: A UML-
Based Modeling Language for Model-Driven
Development of Context-Aware Web Services
Development. In Proceedings of the International
Conference on Mobile Business (ICMB'05), pp. 206-212,
IEEE Computer Society.
Strang, T., Linnhoff-Popien, C., 2004. A Context Modeling
Survey. In Workshop on Advanced Context Modelling,
Reasoning and Management, (UbiComp'04) - The Sixth
International Conference on Ubiquitous Computing.
Nottingham, England.
Tao, J., Sirin, E., Bao, J. and McGuinness, D. L.: Integrity
Constraints in OWL, In Proceedings of the 24th AAAI
Conference on Artificial Intelligence (AAAI-10), Atlanta,
Georgia, USA, July 11-15 (2010)
Truong, H.-L., Manzoor, A., Dustdar, S., 2009. On modeling,
collecting and utilizing context information for disaster
responses in pervasive environments. In ACM
Proceedings of the first international workshop on
Context-aware software technology and applications
(CASTA'09), pp. 25-28, Amsterdam, The Netherlands.
Uszok, A., Bradshaw, J., Jeffers, R., Johnson, M., Tate, A.,
Dalton, J. and Aitken, S., 2005. KAoS Policy
Management for Semantic Web Services. IEEE Intel.
Sys., vol. 19, no. 4, pp. 32 - 41.
Veloudis, S., Verginadis, Y., Patiniotakis, I., Paraskakis, I.,
Mentzas, G., 2016. Context-aware Security Models for
PaaS-enabled Access Control. In Proceedings of the 6th
International Conference on Cloud Computing and
Services Science (CLOSER’16), April 23-25, 2016,
Rome, Italy
Verginadis, Y., Mentzas, G., Veloudis, S., Paraskakis, I.,
2015. A Survey on Context Security Policies. In
Proceedings of the 1st International Workshop on Cloud
Security and Data Privacy by Design (CloudSPD'15), co-
located with the 8th IEEE/ACM International Conference
on Utility and Cloud Computing, Limassol, Cyprus,
December 7-10.
WS-Trust 1.3, 2007. Available online: http://docs.oasis-
open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.doc.