{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:10:34Z","timestamp":1773324634179,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540007081","type":"print"},{"value":"9783540365327","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36532-x_1","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T15:34:36Z","timestamp":1193326476000},"page":"1-15","source":"Crossref","is-referenced-by-count":46,"title":["Towards Security and Privacy for Pervasive Computing"],"prefix":"10.1007","author":[{"given":"Roy","family":"Campbell","sequence":"first","affiliation":[]},{"given":"Jalal","family":"Al-Muhtadi","sequence":"additional","affiliation":[]},{"given":"Prasad","family":"Naldurg","sequence":"additional","affiliation":[]},{"given":"Geetanjali","family":"Sampemane","sequence":"additional","affiliation":[]},{"given":"M.","family":"Dennis Mickunas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,25]]},"reference":[{"key":"1_CR1","unstructured":"\u201cBluetooth.\u201d http:\/\/www.bluetooth.com\/ ."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"M. Langheinrich, \u201cPrivacy by Design-Principles of Privacy-Aware Ubiquitous Systems,\u201d presented at ACM UbiComp 2001, Atlanta, GA, 2001.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"M. Langheinrich, \u201cA Privacy Awareness System for Ubiquitous Computing Environments,\u201d presented at 4th International Conference on Ubiquitous Computing, 2002.","DOI":"10.1007\/3-540-45809-3_19"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"F. Stajano, Security for Ubiquitous Computing: Halsted Press, 2002.","DOI":"10.1002\/0470848693"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"L. Kagal, T. Finin, and A. Joshi, \u201cTrust-Based Security in Pervasive Computing Environments,\u201d IEEE Computer, 2001.","DOI":"10.1109\/2.970591"},{"key":"1_CR6","unstructured":"L. Kagal, J. Undercoffer, F. Perich, A. Joshi, and T. Finin, \u201cVigil: Enforcing Security in Ubiquitous Environments,\u201d in Grace Hopper Celebration of Women in Computing 2002, 2002."},{"key":"1_CR7","unstructured":"J. Boyle and e. al, \u201cThe COPS Protocol.\u201d Internet Draft, Feb. 24, 1999."},{"key":"1_CR8","unstructured":"R. Mundy, D. Partain, and B. Stewart, \u201cIntroduction to SNMPv3.\u201d RFC 2570, April 1999."},{"key":"1_CR9","unstructured":"M. Stevens and e. al, \u201cPolicy Framework.\u201d IETF draft, September 1999."},{"key":"1_CR10","unstructured":"P. Loscocco and S. Smalley, \u201cIntegrating Flexible Support for Security Policies into the Linux Operating System,\u201d presented at Proceedings of the FREENIX Track of the 2001 USENIX, 2001."},{"key":"1_CR11","unstructured":"E. A. M. Luiijf, \u201cInformation Assurance and the Information Society,\u201d presented at EICAR Best Paper Proceedings, 1999."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"M. Rom\u00e1n, C. K. Hess, R. Cerqueira, A. Ranganat, R. H. Campbell, and K. Nahrstedt, \u201cGaia: A Middleware Infrastructure to Enable Active Spaces,\u201d IEEE Pervasive Computing (accepted), 2002.","DOI":"10.1109\/MPRV.2002.1158281"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"M. Roman and R. Campbell, \u201cGAIA: Enabling Active Spaces,\u201d presented at 9th ACM SIGOPS European Workshop, Kolding, Denmark, 2000.","DOI":"10.1145\/566726.566772"},{"key":"1_CR14","unstructured":"M. Roman, C. Hess, A. Ranganathan, P. Madhavarapu, B. Borthakur, P. Viswanathan, R. Cerqueira, R. Campbell, and M. D. Mickunas, \u201cGaiaOS: An Infrastructure for Active Spaces,\u201d University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001-2224 UILU-ENG-2001-1731, 2001."},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","volume":"1","author":"L. Zadeh","year":"1978","unstructured":"L. Zadeh, \u201cFuzzy sets as basis for a theory of possibility,\u201d Fuzzy Sets and Systems, vol. 1, pp. 3\u201328, 1978.","journal-title":"Fuzzy Sets and Systems"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"V. Samar and R. Schemers, \u201cUnified Login with Pluggable Authentication Modules (PAM),\u201d RFC 86.0, 1995.","DOI":"10.1145\/238168.238177"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/0140-3664(94)90105-8","volume":"17","author":"P. Kaijser","year":"1994","unstructured":"P. Kaijser, T. Parker, and D. Pinkas, \u201cSESAME: The Solution to Security for Open Distributed Systems,\u201d Computer Communications, vol. 17, pp. 501\u2013518, 1994.","journal-title":"Computer Communications"},{"key":"1_CR18","unstructured":"M. Roman, F. Kon, and R. H. Campbell, \u201cReflective Middleware: From Your Desk to Your Hand,\u201d IEEE Distributed Systems Online Journal, Special Issue on Reflective Middleware, 2001."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, \u201cRouting Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments,\u201d presented at International Conference of Distributed Computing Systems (ICDCS 2002), Vienna, Austria, 2002.","DOI":"10.1109\/ICDCS.2002.1022244"},{"key":"1_CR20","unstructured":"J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, \u201cRouting through the Mist: Design and Implementation,\u201d UIUCDCS-R-2002-2267, March 2002."},{"key":"1_CR21","unstructured":"Z. Liu, P. Naldurg, S. Yi, R. H. Campbell, and M. D. Mickunas, \u201cAn Agent Based Architecture for Supporting Application Level Security,\u201d presented at DARPA Information Survivability Conference (DISCEX 2000), Hilton Head Island, South Carolina, 2000."},{"key":"1_CR22","unstructured":"P. Naldurg and R. Campbell, \u201cDynamic Access Control Policies in Seraphim,\u201d Department of Computer Science, University of Illinois at Urbana-Champaign UIUCDCS-R-2002-2260, 2002."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"P. Naldurg, R. Campbell, and M. D. Mickunas, \u201cDeveloping Dynamic Security Policies,\u201d presented at Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), San Francisco, CA, USA, 2002.","DOI":"10.1109\/DANCE.2002.1003494"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"G. Sampemane, P. Naldurg, and R. Campbell, \u201cAccess Control for Active Spaces,\u201d presented at the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, 2002.","DOI":"10.1109\/CSAC.2002.1176306"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"R. Sandhu, E. Coyne, H. Fienstein, and C. Youman, \u201cRole Based Access Control Models,\u201d in IEEE Computer, vol. 29, 1996.","DOI":"10.1109\/2.485845"}],"container-title":["Lecture Notes in Computer Science","Software Security \u2014 Theories and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36532-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T20:54:32Z","timestamp":1556916872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36532-X_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007081","9783540365327"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-36532-x_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}