Security and privacy are two pillars for ensuring the effective- ness of IoT services, the third one being data quality. IoT ser- vices should provide correct, complete and updated information: in some scenarios indeed errors or missing values might have crit- ical impact on actions or decisions [10] . Keeping in mind the cru- cial role of the satisfaction of these security, privacy and data qual- ity requirements, it is important to remark that in IoT context the number of violation attempts is high [2] . In other words, in order to deal with the huge amount of critical situations typical of the sharing approach of IoT paradigm, it is fundamental to adopt well- defined enforcement mechanisms able to successfully tackle them. Furthermore, IoT deployments are characterized by a high degree of heterogeneity in terms of architectures and technologies, so that a suitable security framework should be highly flexible in order to adapt to various deployment features.