{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:01:59Z","timestamp":1725559319317},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262190"},{"type":"electronic","value":"9783540319009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11495772_37","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T09:10:03Z","timestamp":1279098603000},"page":"236-242","source":"Crossref","is-referenced-by-count":21,"title":["Context-Aware Access Control Mechanism for Ubiquitous Applications"],"prefix":"10.1007","author":[{"given":"Young-Gab","family":"Kim","sequence":"first","affiliation":[]},{"given":"Chang-Joo","family":"Mon","sequence":"additional","affiliation":[]},{"given":"Dongwon","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Jeong-Oog","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chee-Yang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Doo-Kwon","family":"Baik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"37_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications Magazine"},{"issue":"8","key":"37_CR2","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrson","year":"1976","unstructured":"Harrson, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operation systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"issue":"2","key":"37_CR3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"37_CR4","unstructured":"Feraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, Artech House, INC (2003)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: Designing a distributed authorization service. In: Proceedings of IEEE INFOCOM (1998)","DOI":"10.1109\/INFCOM.1998.665058"},{"key":"37_CR6","unstructured":"Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: proceedings of NISSC 2000 (October 2000)"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing Context-aware Applications Using Environment Roles. In: proceedings of SACMAT 2001 (May 2001)","DOI":"10.1145\/373256.373258"},{"key":"37_CR8","unstructured":"Zhang, G., Parashar, M.: Context-aware Dynamic Access Control for Pervasive Applications. In: proceedings of the CNDS 2004 (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Web Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11495772_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:39:36Z","timestamp":1619505576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11495772_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262190","9783540319009"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11495772_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}