, Elasticsearch Logstash

. Sparqltoxquery,

M. Karim-aroua and B. Zouari, Modeling of A-Posteriori Access Control in Business Processes, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, pp.403-408, 2012.

H. Azkia, N. Cuppens-boulahia, F. Cuppens, and G. Coatrieux, Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment, Sixth International Conference on Information Assurance and Security, pp.197-203, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00540774

H. Azkia, N. Cuppens-boulahia, F. Cuppens, and G. Coatrieux, A posteriori access and usage control policy in healthcare environment, Journal of information assurance and security, vol.6, pp.389-397, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00640655

H. Azkia, N. Cuppens-boulahia, F. Cuppens, and G. Coatrieux, Ontology based log content extraction engine for a posteriori security control, Studies in health technology and informatics, vol.180, pp.746-750, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00868711

F. Baader, D. Calvanese, D. Mcguinness, P. Patel-schneider, and D. Nardi, The description logic handbook: Theory, implementation and applications, 2003.

L. Bahri, B. Carminati, and E. Ferrari, CARDS-collaborative audit and report data sharing for a-posteriori access control in DOSNs, 2015 IEEE Conference on Collaboration and Internet Computing (CIC), pp.36-45, 2015.

D. Bell, J. Leonard, . Lapadula, . Ben-ari, . Benson et al., Secure computer system unified exposition and multics interpretation, Commun. ACM, vol.1, pp.271-280, 1988.

D. Benslimane, M. Barhamgi, F. Cuppens, F. Morvan, B. Defude et al., PAIRSE: a privacy-preserving serviceoriented data integration system, ACM SIGMOD Record, vol.42, pp.42-47, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01124429

N. Bikakis and C. Tsinaraki, Ioannis Stavrakantonakis, Nektarios Gioldasis, and Stavros Christodoulakis, The SPARQL2XQuery interoperability framework. World Wide Web, vol.18, pp.403-490, 2015.

B. Bouchou and C. Niang, Semantic mediator querying, Proceedings of the 18th International Database Engineering & Applications Symposium. ACM, pp.29-38, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01198496

D. Calvanese, B. Cogrel, S. Komla-ebri, R. Kontchakov, D. Lanti et al., Ontop: Answering SPARQL queries over relational databases, Semantic Web, vol.8, pp.471-487, 2017.

. Jg-cederquist, M. Conn, S. Dekker, J. Etalle, and . Hartog, An audit logic for accountability, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.34-43, 2005.

. Jg-cederquist, . Corin, S. Mac-dekker, and . Etalle, The audit logic: Policy compliance in distributed systems, Jeremy den Hartog, and Gabriele Lenzini, 2006.

R. Corin, S. Etalle, J. Den-hartog, G. Lenzini, and I. Staicu, A logic for auditing accountability in decentralized systems, In IFIP World Computer Congress, TC, vol.1, pp.187-201, 2004.

J. David and J. Euzenat, François Scharffe, and Cássia Trojahn dos Santos, vol.2, pp.3-10, 2011.

S. Dawson, S. Qian, and P. Samarati, Providing security and interoperation of heterogeneous systems, Security of Data and Transaction Processing, pp.119-145, 2000.

, Authorization specification and enforcement in federated database systems, Journal of Computer Security, vol.5, pp.155-188, 1997.

M. Dekker and S. Etalle, Audit-Based Access Control for, Electronic Notes in Theoretical Computer Science, vol.168, pp.221-236, 2007.

M. A. , C. Dekker, and S. Etalle, Audit-based access control for electronic health records, Electronic Notes in Theoretical Computer Science, vol.168, pp.221-236, 2007.

M. Du, F. Li, G. Zheng, and V. Srikumar, DeepLog : Anomaly Detection and Diagnosis from System Logs through Deep Learning, pp.1285-1298, 2017.

G. Dubois and D. Boulanger, A Multi-agent system using semantic metadata for the cooperation among multiple information sources, p.4, 2000.

, European Conf. on Principles and Practice of Knowledge Discovery in Databases

A. Abou-el-kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Or-BAC: un modèle de contrôle d'accès basé sur les organisations. Cahiers francophones de la recherche en sécurité de l'information, vol.1, pp.30-43, 2003.

B. Elliott, E. Cheng, C. Thomas-ogbuji, and . Ozsoyoglu, A complete translation from SPARQL into efficient SQL, Proceedings of the 2009 International Database Engineering & Applications Symposium, pp.31-42, 2009.

S. Etalle, F. Massacci, and A. Yautsiukhin, The Meaning of Logs

S. Etalle, H. William, and . Winsborough,

, A Posteriori Compliance Control Categories and Subject Descriptors, pp.11-20

J. Euzenat, An API for ontology alignment, International Semantic Web Conference, pp.698-712, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00825931

D. Ferraiolo, J. Cugini, and D. Kuhn, Role-based access control (RBAC): Features and motivations, Proceedings of 11th annual computer security application conference, pp.241-289, 1995.

T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu et al., R OWL BAC: representing role based access control in OWL, Proceedings of the 13th ACM symposium on Access control models and technologies, pp.73-82, 2008.

B. Gregg, D. Horacio, E. G. Agostino, and . Toledo, Creating an IHE ATNA-based audit repository, Journal of digital imaging, vol.19, issue.4, pp.307-315, 2006.

C. Vincent, D. Hu, R. Ferraiolo, . Kuhn, A. J. Arthur-r-friedman et al., Guide to attribute based access control (abac) definition and considerations (draft), NIST special publication, vol.800, p.162, 2013.

K. Kent and M. Souppaya, Guide to computer security log management, NIST special publication, p.92, 2006.

G. Klyne and J. J. Carroll, Resource description framework (RDF): Concepts and abstract syntax, 2006.

K. Makris, Sparql rewriting for query mediation over mapped ontologies, Nektarios Gioldasis, Nikos Bikakis, and Stavros Christodoulakis, 2010.

M. Mayhew, M. Atighetchi, A. Adler, and R. Greenstadt, Use of Machine Learning in Big Data Analytics for Insider Threat Detection

L. Deborah, F. Mcguinness, and . Van-harmelen, OWL web ontology language overview. W3C recommendation, vol.10, 2004.

P. Mitra, C. Pan, P. Liu, and V. Atluri, Privacy-preserving semantic interoperation and access control of heterogeneous databases, Proceedings of the 2006 ACM Symposium on Information, pp.66-77, 2006.

C. Pan, P. Mitra, and P. Liu, Semantic access control for information interoperation, Proceedings of the eleventh ACM symposium on Access control models and technologies, pp.237-246, 2006.

E. Prud and A. Seaborne, Sparql query language for rdf, 2006.

L. Qin and V. Atluri, Concept-level access control for the semantic web, Proceedings of the 2003 ACM workshop on XML security, pp.94-103, 2003.

Y. Qu, X. Zhang, and H. Li, OREL: an ontology-based rights expression language, Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters. ACM, pp.324-325, 2004.

N. K. Sharma and A. Joshi, Representing attribute based access control policies in owl, 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), pp.333-336, 2016.

S. Vimercati, Discretionary Access Control Policies (DAC), pp.356-358, 2011.

J. Wainer, Anomaly Detection using Process Mining, pp.1-13

G. Wiederhold, Mediators in the architecture of future information systems, Computer, vol.25, pp.38-49, 1992.