{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T18:05:44Z","timestamp":1769709944800,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030016883","type":"print"},{"value":"9783030016890","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_11","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T11:22:22Z","timestamp":1537615342000},"page":"132-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications"],"prefix":"10.1007","author":[{"given":"B. B.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Megha","family":"Quamara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"issue":"11\u201312","key":"11_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S0965-2590(07)70155-X","volume":"19","author":"F Favier","year":"2007","unstructured":"Favier, F.: Smart cards and healthcare. Card Technol. Today 19(11\u201312), 10 (2007)","journal-title":"Card Technol. Today"},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.trc.2010.12.003","volume":"19","author":"MP Pelletier","year":"2011","unstructured":"Pelletier, M.P., Tr\u00e9panier, M., Morency, C.: Smart card data use in public transit: a literature review. Transp. Res. Part C: Emerg. Technol. 19(4), 557\u2013568 (2011)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-50500-8_5","volume-title":"Smart Cards, Tokens, Security and Applications","author":"K Markantonakis","year":"2017","unstructured":"Markantonakis, K., Main, D.: Smart cards for banking and finance. In: Mayes, K., Markantonakis, K. (eds.) Smart Cards, Tokens, Security and Applications, pp. 129\u2013153. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50500-8_5"},{"key":"11_CR4","volume-title":"Smart Card Handbook","author":"W Rankl","year":"2004","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook, 3rd edn. Wiley, Hoboken (2004)","edition":"3"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.istr.2008.08.002","volume":"13","author":"S Arora","year":"2008","unstructured":"Arora, S.: National e-ID card schemes: a European overview. Inf. Secur. Tech. Rep. 13(2), 46\u201353 (2008)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-50500-8_1","volume-title":"Smart Cards, Tokens, Security and Applications","author":"K Mayes","year":"2017","unstructured":"Mayes, K.: An introduction to smart cards. In: Mayes, K., Markantonakis, K. (eds.) Smart Cards, Tokens, Security and Applications, pp. 1\u201329. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50500-8_1"},{"key":"11_CR7","unstructured":"2014\u20132018 Global Card Market Trends & Forecasts The Next 5 Years. https:\/\/icma.com\/wp-content\/uploads\/2015\/04\/Al_V6-2014-2018-Trends-Forecasts.pdf . Accessed 11 Feb 2018"},{"key":"11_CR8","unstructured":"Sharp, C.B., et al.: U.S. Patent No. 9,098,714. U.S. Patent and Trademark Office, Washington, DC (2015)"},{"issue":"2","key":"11_CR9","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.giq.2014.12.004","volume":"32","author":"D Belanche-Gracia","year":"2015","unstructured":"Belanche-Gracia, D., Casal\u00f3-Ari\u00f1o, L.V., P\u00e9rez-Rueda, A.: Determinants of multi-service smartcard success for smart cities development: a study based on citizens\u2019 privacy and security perceptions. Gov. Inf. Q. 32(2), 154\u2013163 (2015)","journal-title":"Gov. Inf. Q."},{"key":"11_CR10","doi-asserted-by":"crossref","DOI":"10.1201\/9780849390326","volume-title":"Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management","author":"TR Peltier","year":"2016","unstructured":"Peltier, T.R.: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press, Boca Raton (2016)"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1109\/JSYST.2013.2297707","volume":"10","author":"AH Celdr\u00e1n","year":"2016","unstructured":"Celdr\u00e1n, A.H., Clemente, F.J.G., P\u00e9rez, M.G., P\u00e9rez, G.M.: SeCoMan: a semantic-aware policy framework for developing privacy-preserving and context-aware smart applications. IEEE Syst. J. 10(3), 1111\u20131124 (2016)","journal-title":"IEEE Syst. J."},{"key":"11_CR12","unstructured":"Guccione, L.J., Meyerstein, M.V., Cha, I., Schmidt, A., Leicher, A., Shah, Y.C.: U.S. Patent No. 9,363,676. U.S. Patent and Trademark Office, Washington, DC (2016)"},{"key":"11_CR13","unstructured":"Narasinghanallur, J., Ho, M.H., Keefe, T., Sedlar, E., Chui, C.C., Pesati, V.: U.S. Patent No. 9,886,590. U.S. Patent and Trademark Office, Washington, DC (2018)"},{"key":"11_CR14","volume-title":"Open Enterprise Security Architecture (O-ESA): A Framework and Template for Policy-Driven Security","author":"S Wahe","year":"2011","unstructured":"Wahe, S., Petersen, G.: Open Enterprise Security Architecture (O-ESA): A Framework and Template for Policy-Driven Security. Van Haren Publishing, Zaltbommel (2011)"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.future.2015.11.026","volume":"74","author":"A Castiglione","year":"2017","unstructured":"Castiglione, A., D\u2019Arco, P., De Santis, A., Russo, R.: Secure group communication schemes for dynamic heterogeneous distributed computing. Future Gener. Comput. Syst. 74, 313\u2013324 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"11_CR16","unstructured":"NIST-Compter Security Resource Center. https:\/\/csrc.nist.gov\/Projects\/Access-Control-Policy-Tool . Accessed 25 Jan 2018"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Hwang, J., Xie, T., Hu, V., Altunay, M.: ACPT: a tool for modeling and verifying access control policies. In: 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 40\u201343. IEEE (2010)","DOI":"10.1109\/POLICY.2010.22"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.ins.2016.08.093","volume":"387","author":"A Castiglione","year":"2017","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Huang, X., Castiglione, A.: Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387, 56\u201374 (2017)","journal-title":"Inf. Sci."},{"issue":"10","key":"11_CR19","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1109\/TIFS.2016.2581147","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349\u20132364 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T17:05:44Z","timestamp":1571936744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}