{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:08:21Z","timestamp":1725530901693},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387887746"},{"type":"electronic","value":"9780387887753"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-88775-3_17","type":"book-chapter","created":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T17:55:18Z","timestamp":1240077318000},"page":"305-322","source":"Crossref","is-referenced-by-count":1,"title":["SERENITY in e-Business and Smart Item Scenarios"],"prefix":"10.1007","author":[{"given":"Azzedine","family":"Benameur","sequence":"first","affiliation":[]},{"given":"Paul El","family":"Khoury","sequence":"additional","affiliation":[]},{"given":"Magali","family":"Seguran","sequence":"additional","affiliation":[]},{"given":"Smriti Kumar","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,31]]},"reference":[{"key":"17_CR1_17","unstructured":"Axis2 Web service Engine. \n                    http:\/\/ws.apache.org\/axis2"},{"key":"17_CR2_17","unstructured":"Rampart Axis2 Security Module. \n                    http:\/\/ws.apache.org\/rampart\/"},{"key":"17_CR3_17","unstructured":"Web Service Policy. \n                    http:\/\/www.w3.org\/Submission\/WS-Policy\/"},{"key":"17_CR4_17","unstructured":"Web Service Security. \n                    http:\/\/www.oasis-open.org\/committees\/wss\/"},{"key":"17_CR5_17","unstructured":"Web Service Trust Language. \n                    http:\/\/docs.oasis-open.org\/ws-sx\/ws-trust\/200512\/ws-trust-1.3-os.html"},{"key":"17_CR6_17","doi-asserted-by":"crossref","unstructured":"Pigot H, Mayers A, and Giroux S (2003) The intelligent habitat and everyday life activity support. In: Proceedings of the 5th international conference on Simulations in Biomedicine, Slovenia, 507-516.","DOI":"10.2495\/BIO030501"},{"issue":"2","key":"17_CR7_17","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer for the twenty-first century, Scientific American, 265(2):94-104.","journal-title":"Scientific American"},{"issue":"4","key":"17_CR8_17","first-page":"1017","volume":"8","author":"M Satyanarayanan","year":"2001","unstructured":"Satyanarayanan M (2001) Pervasive computing: vision and challenges, 8(4):1017.","journal-title":"Pervasive computing: vision and challenges"},{"issue":"1","key":"17_CR9_17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TSMCA.2004.838456","volume":"35","author":"P Remagnino","year":"2005","unstructured":"Remagnino P and Foresti G (2005) Ambient intelligence: A new multidisciplinary paradigm, IEEE Transactions on Systems, Man and Cybernetics, Part A, 35(1):16.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"key":"17_CR10_17","unstructured":"European Parliament (1995) European directive 95\/46\/ce. Available: \n                    http:\/\/www.cdt.org\/privacy\/eudirective\/EU\n                    \n                   Directive.html. Accessed 1 December 2008"},{"key":"17_CR11_17","unstructured":"Sanchez-Cid E, Munoz A, Khoury P E and Compagna L (2007) XACML as a security and dependability pattern for access control in AmI environments. In: Proceedings of the Ambient Intelligence Developments Conf. (AmI.d'07), Springer."},{"key":"17_CR12_17","doi-asserted-by":"crossref","unstructured":"Compagna L, Khoury P E, Massacci F, Thomas R and Zannone N (2007) How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In ICAIL'07: Proceedings of the 11th international conference on Artificial intelligence and law. ACM Press, New York, NY, USA, 149-153.","DOI":"10.1145\/1276318.1276346"},{"key":"17_CR13_17","doi-asserted-by":"crossref","unstructured":"Cuevas A, Khoury P E, Gomez L and Laube A (2008) Security patterns for capturing encryption-based access control to sensor data. The Second International Conference on Sensor Technologies and Applications, Secureware.","DOI":"10.1109\/SECURWARE.2008.17"},{"key":"17_CR14_17","unstructured":"Khoury P E and Li K (2008) Serenity demo: Secure remote healthcare environment using serenity. EuroTrustAmI'08, System Engineering For Security and Dependability."},{"key":"17_CR15_17","volume-title":"Serenity demo: Secure remote healthcare environment using serenity","author":"PE Khoury","year":"2008","unstructured":"Khoury P E, Li K, Busnel P, Giroux S (2008) Serenity demo: Secure remote healthcare environment using serenity. Information Communication Technologies, Lyon France."},{"key":"17_CR16_17","doi-asserted-by":"crossref","unstructured":"Khoury P E, Mokhtari A, Coquery E, Hacid M S (2008) An Ontological Interface for Software Developers to Select Security Patterns. The Second International Workshop on Secure systems methodologies using patterns, SPattern'08.","DOI":"10.1109\/DEXA.2008.110"},{"key":"17_CR17_17","doi-asserted-by":"crossref","unstructured":"Busnel P, Khoury P E, Giroux S and Li K (2008) Achieving Socio-Technical Confidentiality using Security Pattern in Smart Homes, Third International Symposium on Smart Home.","DOI":"10.1109\/FGCN.2008.227"}],"container-title":["Advances in Information Security","Security and Dependability for Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-88775-3_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:28:47Z","timestamp":1619670527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88775-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387887746","9780387887753"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88775-3_17","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2009]]}}}