D. Basin, M. Clavel, and M. Egea, A decade of model-driven security, Proceedings of the 16th ACM symposium on Access control models and technologies, pp.1-10, 2011.

G. Blair, N. Bencomo, and R. France, Models@ run. time. Computer, vol.42, issue.10, 2009.

M. Botts and A. Robin, Opengis sensor model language (sensorml) implementation specification. OpenGIS Implementation Specification OGC, 2007.

C. Bunse, H. Gross, and C. Peper, Applying a modelbased approach for embedded system development, Software Engineering and Advanced Applications, 2007.

K. Chooruang and P. Mangkalakeeree, Wireless heart rate monitoring system using mqtt, Procedia Computer Science, vol.86, pp.160-163, 2016.

, OASIS XACML Technical Committee et al. extensible access control markup language (xacml) version 3.0. Oasis standard, OASIS, 2013.

J. Cugini, D. Kuhn, and . Ferraiolo, Role-based access control: Features and motivations, Proceedings of the Annual Computer Security Applications Conference, 1995.

N. Davis, W. Humphrey, G. Samuel-t-redwine, G. Zibulski, and . Mcgraw, Processes for producing secure software, IEEE Security & Privacy, vol.2, issue.3, pp.18-25, 2004.

D. Dietterle, J. Ryman, K. Dombrowski, and R. Kraemer, Mapping of high-level sdl models to efficient implementations for tinyos, Digital System Design, pp.402-406, 2004.

. Eclipse, Eclipse Vorto-IoT Toolset for standardized device descriptions

U. K. Egham, Gartner says 8.4 billion connected" things" will be in use in 2017, 2016.

M. Eysholdt and H. Behrens, Xtext: Implement your language faster than the quick and dirty way, Proceedings of the ACM International Conference Companion on Object Oriented Programming Systems Languages and Applications Companion, OOPSLA '10, pp.307-309, 2010.

N. Harrand, F. Fleurey, B. Morin, K. E. Husa, and ;. , Thingml: a language and code generation framework for heterogeneous targets, Proceedings I. Berrouyne

, of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp.125-135, 2016.

G. Hernandez, O. Arias, D. Buentello, and Y. Jin, Smart nest thermostat: A smart spy in your home, 2014.

C. Vincent, D. Hu, R. Ferraiolo, . Kuhn, A. J. Arthur-r-friedman et al., Guide to attribute based access control (abac) definition and considerations (draft). NIST special publication, vol.800, 2013.

C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, Ddos in the iot: Mirai and other botnets, Computer, vol.50, issue.7, pp.80-84, 2017.

A. Roger and . Light, Mosquitto: server and client implementation of the mqtt protocol, Journal of Open Source Software, vol.2, issue.13, 2017.

J. E. Luzuriaga, J. C. Cano, C. Calafate, P. Manzoni, M. Perez et al., Handling mobility in iot applications using the mqtt protocol, Internet Technologies and Applications (ITA), 2015.

R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, Internet of things (iot) security: Current status, challenges and prospective measures, Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for, pp.336-341, 2015.

S. Martínez, J. Garcia-alfaro, F. Cuppens, N. Cuppensboulahia, and J. Cabot, Model-Driven Extraction and Analysis of Network Security Policies, Model-Driven Engineering Languages and Systems, pp.52-68, 2013.

O. Mavropoulos, H. Mouratidis, A. Fish, and E. Panaousis, Asto: A tool for security analysis of iot systems, Software Engineering Research, Management and Applications, pp.395-400, 2017.

B. Morin, N. Harrand, and F. Fleurey, Model-based software engineering to tame the iot jungle, IEEE Software, vol.34, issue.1, pp.30-36, 2017.

J. Mukerji and J. Miller, Mda guide version 1.0. 1. Object Management Group, 2003.

J. Pescatore and G. Shpantzer, Securing the internet of things survey, SANS Institute, pp.1-22, 2014.

D. M. Lauri-iw-pesonen, J. Eyers, and . Bacon, Access control in decentralised publish/subscribe systems, JNW, vol.2, issue.2, pp.57-67, 2007.

C. Rathfelder and E. Taspolatoglu, SensIDL: Towards a generic framework for implementing sensor communication interfaces, 2015.

Y. Seralathan, T. T. Oh, S. Jadhav, J. Myers, J. P. Jeong et al., Iot security vulnerability: A case study of a web camera, Advanced Communication Technology (ICACT), pp.172-177, 2018.

H. Shen, Content-based publish/subscribe systems. In Handbook of Peer-toPeer Networking, pp.1333-1366, 2010.

T. Micro, TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras-TrendLabs Security Intelligence Blog, 2017.

A. Vasilevskiy, B. Morin, Ø. Haugen, and P. Evensen, Agile development of home automation system with thingml, IEEE 14th International Conference on, 2016.

N. Woolf, Ddos attack that disrupted internet was largest of its kind in history, experts say. The Guardian, vol.26, 2016.