REFERENCES
Bartolini, C., Muthuri, R., and Santos, C. (2017). Using
ontologies to model data protection requirements in
workflows. In New Frontiers in Artificial Intelligence,
volume 10091, pages 233–248. Springer.
Buterin, V. (n.d.). A next-generation smart contract
and decentralized application platform. Available
online at: https://github.com/ethereum/wiki/
wiki/White-Paper.
Cha, S. C., Chen, J. F., Su, C., and Yeh, K. H. (2018). A
blockchain connected gateway for ble-based devices
in the internet of things. IEEE Access, PP(99):1–1.
Cha, S. C., Tsai, T. Y., Peng, W. C., Huang, T. C., and
Hsu, T. Y. (2017). Privacy-aware and blockchain con-
nected gateways for users to access legacy iot devices.
In 6th Global Conference on Consumer Electronics
(GCCE), pages 1–3. IEEE.
Conoscenti, M., Vetr
`
o, A., and Martin, J. C. D. (2016).
Blockchain for the Internet of Things: A systematic
literature review. In 13th International Conference of
Computer Systems and Applications (AICCSA), pages
1–6. IEEE.
Demertzis, K., Iliadis, L. S., and Anezakis, V.-D. (2018).
An innovative soft computing system for smart energy
grids cybersecurity. Advances in Building Energy Re-
search, 12(1):3–24.
Eckert, K., Meilicke, C., and Stuckenschmidt, H. (2009).
Improving ontology matching using meta-level learn-
ing. In The Semantic Web: Research and Applications,
volume 5554, pages 158–172. Springer.
EnCoRe Project (2010). Ensuring Consent and Revocation.
www.hpl.hp.com/breweb/encoreproject/.
European Parliament and Council (2016). Regulation (EU)
2016/679 of 27 April 2016 on the protection of natural
persons with regard to the processing of personal
data and on the free movement of such data, and re-
pealing Directive 95/46/EC (General Data Protection
Regulation). Official Journal of the European Union.
http://eur-lex.europa.eu/legal-content/
en/TXT/?uri=CELEX\%3A32016R0679.
Housley, R., Ford, W., Polk, W., and Solo, D. (1999). In-
ternet X.509 public key infrastructure certificate and
CRL profile. RFC 2459, RFC Editor.
IERC (2015). European Research Cluster on the Internet of
Things, Internet of Things: IoT governance, privacy
and security issues.
Lucero, S. (2016). Iot platforms: Enabling the Internet of
Things. White paper, IHS Technology.
Mendez, D. M., Papapanagiotou, I., and Yang, B. (2017).
Internet of Things: Survey on security and privacy.
arXiv:1707.01879v2 [cs.CR].
Mozzaquatro, B. A., Jardim-Goncalves, R., and Agostinho,
C. (2015). Towards a reference ontology for secu-
rity in the Internet of Things. In International Work-
shop on Measurements Networking (M&N), pages 1–
6. IEEE.
Mytis-Gkometh, P., Drosatos, G., Efraimidis, P. S., and
Kaldoudi, E. (2018). Notarization of knowledge re-
trieval from biomedical repositories using blockchain
technology. In Precision Medicine Powered by
pHealth and Connected Health, volume 66 of IFMBE,
pages 69–73. Springer.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. https://bitcoin.org/bitcoin.pdf.
O’Connor, Y., Rowan, W., Lynch, L., and Heavin, C.
(2017). Privacy by design: Informed consent and in-
ternet of things for smart health. Procedia Computer
Science, 113:653–658.
Otero-Cerdeira, L., Rodrguez-Martnez, F. J., and Gmez-
Rodrguez, A. (2015). Ontology matching: A literature
review. Expert Systems with Applications, 42(2):949–
971.
Passant, A., Laublet, P., Breslin, J. G., and Decker, S.
(2009). A URI is worth a thousand tags: From tagging
to linked data with MOAT. International Journal on
Semantic Web and Information Systems, 5(3):71–94.
Pereira, T. and Santos, H. (2009). An Ontology Based
Approach to Information Security. In Metadata
and Semantic Research, volume 46, pages 183–192.
Springer.
Roman, R., Najera, P., and Lopez, J. (2011). Securing the
Internet of Things. Computer, 44(9):51–58.
Roman, R., Zhou, J., and Lopez, J. (2013). On the features
and challenges of security and privacy in distributed
internet of things. Computer Networks, 57(10):2266–
2279.
Russell, B., Garlat, C., and Lingenfelter, D. (2015). Se-
curity guidance for early adopters of the Internet of
Things (IoT). White paper, Cloud Security Alliance.
Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini,
A. (2015). Security, privacy and trust in Internet
of Things: The road ahead. Computer Networks,
76:146–164.
Stankovic, J. A. (2014). Research directions for the Internet
of Things. IEEE Internet of Things Journal, 1(1):3–9.
Xu, G., Cao, Y., Ren, Y., Li, X., and Feng, Z. (2017). Net-
work security situation awareness based on semantic
ontology and user-defined rules for Internet of Things.
IEEE Access, 5:21046–21056.
Ya-Yueh Shih and Duen-Ren Liu (2005). Hybrid rec-
ommendation approaches: Collaborative filtering via
valuable content information. pages 217b–217b.
IEEE.
Yang, Z., Wu, B., Zheng, K., Wang, X., and Lei, L.
(2016). A survey of collaborative filtering-based rec-
ommender systems for mobile internet applications.
IEEE Access, 4:3273–3287.
Yli-Huumo, J., Ko, D., Choi, S., Park, S., and Smolander,
K. (2016). Where is current research on blockchain
technology? – A systematic review. PLOS ONE,
11(10):e0163477.
Zhang, Z.-K., Cho, M. C. Y., Wang, C.-W., Hsu, C.-W.,
Chen, C.-K., and Shieh, S. (2014). IoT security: On-
going challenges and research opportunities. In 7th
International Conference on Service-Oriented Com-
puting and Applications, pages 230–234. IEEE.
Zhu, X., Ghahramani, Z., and Lafferty, J. (2003). Semi-
supervised learning using gaussian fields and har-
monic functions. In IN ICML, pages 912–919.
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem
577