{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:46:08Z","timestamp":1725471968954},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478423"},{"type":"electronic","value":"9783540478454"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11907503_20","type":"book-chapter","created":{"date-parts":[[2006,10,24]],"date-time":"2006-10-24T14:15:53Z","timestamp":1161699353000},"page":"234-237","source":"Crossref","is-referenced-by-count":6,"title":["Context-Aware Trust Domains"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Neisse","sequence":"first","affiliation":[]},{"given":"Maarten","family":"Wegdam","sequence":"additional","affiliation":[]},{"given":"Marten","family":"van Sinderen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Dey, A.K., Salber, D., Abowd, G.D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. In: HC Interaction, vol.\u00a016 (2001)","DOI":"10.1207\/S15327051HCI16234_02"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Grandinson, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W., Reitsma, J.: Context sensitive access control. In: Proceedings of the 10th ACM SACMAT, Sweden (June 2005)","DOI":"10.1145\/1063979.1064000"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1007\/978-3-540-39867-7_69","volume-title":"Personal Wireless Communications","author":"R. Molva","year":"2003","unstructured":"Molva, R., Michiardi, P.: Security in ad hoc networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol.\u00a02775, pp. 756\u2013775. Springer, Heidelberg (2003)"},{"key":"20_CR5","volume-title":"Perceived Privacy","author":"H. Boland","year":"2006","unstructured":"Boland, H., Soute, I.: Perceived Privacy. AMIGO project workshop.Telematica Instituut, The Netherlands (March 2006)"},{"key":"20_CR6","unstructured":"AWARENESS Service Infrastructure D2.1 - Architectural specification of the service infrastructure, http:\/\/awareness.freeband.nl"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M., Tonouchi, T.: Tools for Domain-based Policy Management of Distributed Systems. In: IEEE\/IFIP NOMS, Italy (April 2002)","DOI":"10.1109\/NOMS.2002.1015565"}],"container-title":["Lecture Notes in Computer Science","Smart Sensing and Context"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11907503_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T23:53:03Z","timestamp":1555890783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11907503_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478423","9783540478454"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11907503_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}