“…Several studies share the same underlying technologies to deliver their solutions, including OWL/ontologies (all studies), SWRL [10,15,16,25,38,39,46,[50][51][52], RDF [17,18,32,37,47,59], SPARQL [17,37,59], XACML [15,38,39,51,57], Jena [25,36,37,46], Semantic APIs/Web Services [9,36,37], and Internet of Things (IoT) devices [3,18,59]. It demonstrates the flexibility of SW tools to allow the implementation of security mechanisms to protect sensitive data and still enable the interoperability and integration of such data.…”