REFERENCES 
Addie, R.G. & Colman, A., 2010. Five Criteria for Web-
Services Security Architecture. In 4th International 
Conference on Network and System Security (NSS),. 
pp. 521–526. 
Ardagna, C.A. et al., 2009. An XACML-based privacy-
centered access control system. In Proceedings of the 
first ACM workshop on Information security 
governance - WISG ’09. p. 49. 
Brown, K.P. et al., 2012. Fine-grained filtering of data 
providing Web Services with XACML. In Proceedings 
of the Workshop on Enabling Technologies: 
Infrastructure for Collaborative Enterprises, WETICE. 
pp. 438–443. 
Demchenko, Y., Cristea, M. & De Laat, C., 2009. 
XACML policy profile for multidomain network 
resource provisioning and supporting authorisation 
infrastructure. In Proceedings - 2009 IEEE 
International Symposium on Policies for Distributed 
Systems and Networks, POLICY 2009. pp. 98–101. 
Díaz-López, D. et al., 2015. Managing XACML systems 
in distributed environments through Meta-Policies. 
Computers and Security, 48, pp.92–115. 
Ferrini, R. & Bertino, E., 2009. Supporting RBAC with 
XACML+OWL. In Proceedings of the 14th ACM 
symposium on Access control models and 
technologies SE - SACMAT ’09. pp. 145–154. 
Available at: citeulike-article-id:9252058%5Cnhttp:// 
dx.doi.org/10.1145/1542207.1542231. 
Fisler, K. et al., 2005. Verification and Change-Impact 
Analysis of Access-Control Policies. Proceedings of 
the 27th International Conference on Software 
Engineering, pp.196–205. 
FP7, 2016. SMARTIE - secure and smarter cities data 
management. Available at: http://www.smartie-
project.eu/ [Accessed October 25, 2016]. 
Kabbani, B. et al., 2014. Specification and enforcement of 
dynamic authorization policies oriented by situations. 
In 2014 6th International Conference on New 
Technologies, Mobility and Security - Proceedings of 
NTMS 2014 Conference and Workshops. 
Kehlenbeck, M., Sandner, T. & Breitner, M.H., 2010. 
Managing internal control in changing organizations 
through business process intelligence - A service 
oriented architecture for the XACML based 
monitoring of supporting systems. In Proceedings of 
the Annual Hawaii International Conference on 
System Sciences. 
Keleta, Y., Eloff, J.H. & Venter, H., 2005. Proposing a 
Secure XACML architecture ensuring privacy and 
trust, Available at: http://icsa.cs.up.ac.za/issa/ 
2005/Proceedings/Research/093_Article.pdf. 
Lin, D. et al., 2013. A similarity measure for comparing 
XACML policies. IEEE Transactions on Knowledge 
and Data Engineering, 25(9), pp.1946–1959. 
Liu, A.X. et al., 2011. Designing fast and scalable 
XACML policy evaluation engines. IEEE  
  Transactions on Computers, 60(12), pp.1802–1817. 
Lorch, M. et al., 2003. First experiences using XACML  
  for access control in distributed systems. In 
Proceedings of the 2003 ACM workshop on XML 
security. pp. 25–37. 
Nam, T. & Pardo, T. a., 2011. Conceptualizing smart city 
with dimensions of technology, people, and 
institutions. Proceedings of the 12th Annual 
International Digital Government Research 
Conference on Digital Government Innovation in 
Challenging Times - dg.o ’11, p.282. Available at: 
http://dl.acm.org/citation.cfm?id=2037556.2037602%
5Cnhttp://dl.acm.org/citation.cfm?id=2072069.207210
0%5Cnhttp://dl.acm.org/citation.cfm?doid=2037556.2
037602. 
OASIS, 2013. eXtensible Access Control Markup 
Language (XACML) Version 3.0. Available at: 
http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-
spec-os-en.pdf [Accessed October 25, 2016]. 
OASIS, 1993. OASIS. Available at: https://www.oasis-
open.org/org [Accessed October 23, 2016]. 
Priebe, T. et al., 2007. Supporting attribute-based access 
control in authorization and authentication 
infrastructures with ontologies. Journal of Software, 
2(1), pp.27–38. 
Priebe, T., Dobmeier, W. & Kamprath, N., 2006. 
Supporting attribute-based access control with 
ontologies. In Proceedings - First International 
Conference on Availability, Reliability and Security, 
ARES 2006. pp. 465–472. 
Qing, X. & Adams, C., 2006. XACML-Based Policy-
Driven Access Control for Mobile Environments. In 
Canadian Conference on Electrical and Computer 
Engineering. pp. 643–646. 
Samarati, P. & Di Vimercati, S.D.C., 2001. Access 
Control: Policies, Models, and Mechanisms. 
Foundations of Security Analysis and Design, 2171, 
pp.137–196. Available at: http:// 
www.springerlink.com/index/80wrewj7j1a716wb.pdf. 
Sardinha, A., Rao, J. & Sadeh, N., 2007. Enforcing 
context-sensitive policies in collaborative business 
environments. In Proceedings - International 
Conference on Data Engineering. pp. 705–714. 
Shelton, T., Zook, M. & Wiig, A., 2015. The “actually 
existing smart city.” Cambridge Journal of Regions, 
Economy and Society, 8, pp.13–25. Available at: 
http://cjres.oxfordjournals.org/lookup/doi/10.1093/cjre
s/rsu026. 
Stepien, B., Matwin, S. & Felty, A.P., 2011. Advantages 
of a non-technical {XACML} notation in role-based 
models. In Ninth Annual Conference on Privacy, 
Security and Trust. pp. 193--200. 
XACML, 2013. AT&T XACML 3.0 Implementation. 
Available at: https://github.com/att/XACML 
[Accessed October 23, 2016]. 
Xu, M. & Duminda, W., 2009. A role-based XACML 
administration and delegation profile and its 
enforcement architecture. In ACM workshop on 
Secure web services. pp. 53–60. 
Xu, M., Wijesekera, D. & Zhang, X., 2011. Runtime 
administration of an RBAC profile for XACML. IEEE 
Transactions on Services Computing, 4(4), pp.286–
299.