{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T05:16:22Z","timestamp":1736658982352,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689621"},{"type":"electronic","value":"9783540689638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11961635_9","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T18:56:45Z","timestamp":1164653805000},"page":"132-146","source":"Crossref","is-referenced-by-count":5,"title":["Context-Aware Provisional Access Control"],"prefix":"10.1007","author":[{"given":"Amir Reza","family":"Masoumzadeh","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Korkea-aho, M.: Context-aware applications survey. Technical report, Helsinki University of Technology (2000)"},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Personal and Ubiquitous Computing\u00a05(1), 4\u20137 (2001)","journal-title":"Personal and Ubiquitous Computing"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Models, protocols, and architectures for secure pervasive computing: Challenges and research directions. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, FL, USA, pp. 164\u2013170 (2004)","DOI":"10.1109\/PERCOMW.2004.1276925"},{"key":"9_CR4","volume-title":"8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003)","author":"P.D. McDaniel","year":"2003","unstructured":"McDaniel, P.D.: On context in authorization policy. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Villa Gallia, Como, Italy. ACM Press, New York (2003)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Kudo, M., Subrahmanian, V.S.: Provisional authorizations. In: 1st Workshop on Security and Privacy in E-Commerce, Athens, Greece (2000)","DOI":"10.1007\/978-1-4615-1467-1_8"},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s102070100010","volume":"1","author":"M. Kudo","year":"2002","unstructured":"Kudo, M.: Pbac: Provision-based access control model. International Journal of Information Security\u00a01(2), 116\u2013130 (2002)","journal-title":"International Journal of Information Security"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","first-page":"502","volume-title":"Efficiency and Effectiveness of XML Tools and Techniques and Data Integration over the Web","author":"C. Bettini","year":"2003","unstructured":"Bettini, C., Jajodia, S., Sean Wang, X., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Bressan, S., Chaudhri, A.B., Li Lee, M., Yu, J.X., Lacroix, Z. (eds.) CAiSE 2002 and VLDB 2002. LNCS, vol.\u00a02590, pp. 502\u2013513. Springer, Heidelberg (2003)"},{"issue":"1","key":"9_CR8","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.S.: The uconabc usage control model. ACM Transactions on Information and System Security\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"9_CR9","first-page":"757","volume-title":"Fifth International Conference on Computer and Information Technology (CIT 2005)","author":"W. Han","year":"2005","unstructured":"Han, W., Zhang, J., Yao, X.: Context-sensitive access control model and implementation. In: Fifth International Conference on Computer and Information Technology (CIT 2005), Shanghai, China, pp. 757\u2013763. IEEE Computer Society, Los Alamitos (2005)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/PERCOMW.2004.1276900","volume-title":"2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops)","author":"G. Kouadri Most\u00e9faoui","year":"2004","unstructured":"Kouadri Most\u00e9faoui, G., Br\u00e9zillon, P.: Modeling context-based security policies with contextual graphs. In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, FL, USA, pp. 28\u201332. IEEE Computer Society, Los Alamitos (2004)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/CSAC.2002.1176307","volume-title":"18th Annual Computer Security Applications Conference (ACSAC 2002)","author":"M.A. Al-Kahtani","year":"2002","unstructured":"Al-Kahtani, M.A., Sandhu, R.S.: A model for attribute-based user-role assignment. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, pp. 353\u2013364. IEEE Computer Society, Los Alamitos (2002)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Moyer, M.J., Ahamad, M.: Generalized role-based access control. In: 21st International Conference on Distributed Computing Systems, pp. 391\u2013398 (2001)","DOI":"10.1109\/ICDSC.2001.918969"},{"key":"9_CR13","unstructured":"Zhang, G., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Communication Networks and Distributed Systems Modeling and Simulation Conference, San Diego, USA (2004)"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MPRV.2002.1158281","volume":"1","author":"M. Roman","year":"2002","unstructured":"Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: A middleware infrastructure for active spaces. IEEE Pervasive Computing\u00a01(4), 74\u201383 (2002)","journal-title":"IEEE Pervasive Computing"},{"key":"9_CR15","first-page":"31","volume-title":"IEEE Symposium on Security and Privacy","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 31\u201342. IEEE Computer Society, Los Alamitos (1997)"},{"key":"9_CR16","first-page":"98","volume-title":"7th IEEE International Enterprise Distributed Object Computing Conference","author":"N. Dunlop","year":"2003","unstructured":"Dunlop, N., Indulska, J., Raymond, K.: Methods for conflict resolution in policy-based management systems. In: 7th IEEE International Enterprise Distributed Object Computing Conference, Brisbane, Australia, pp. 98\u2013109. IEEE Computer Society, Los Alamitos (2003)"},{"key":"9_CR17","unstructured":"ITU-T: Security Frameworks for Open Systems: Access Control Framework. ITU-T Recommendation X.812 (1995)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11961635_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T04:50:45Z","timestamp":1736657445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11961635_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540689621","9783540689638"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11961635_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}