{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:05:31Z","timestamp":1775253931822,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030029210","type":"print"},{"value":"9783030029227","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02922-7_9","type":"book-chapter","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T05:42:24Z","timestamp":1539927744000},"page":"127-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic Transitions of States for Context-Sensitive Access Control Decision"],"prefix":"10.1007","author":[{"given":"A. S. M.","family":"Kayes","sequence":"first","affiliation":[]},{"given":"Wenny","family":"Rahayu","sequence":"additional","affiliation":[]},{"given":"Tharam","family":"Dillon","sequence":"additional","affiliation":[]},{"given":"Syed","family":"Mahbub","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Pardede","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"issue":"7","key":"9_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M Weiser","year":"1993","unstructured":"Weiser, M.: Some computer science issues in ubiquitous computing. Commun. ACM 36(7), 75\u201384 (1993)","journal-title":"Commun. ACM"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE. Computer 29, 38\u201347 (1996)","journal-title":"Computer"},{"issue":"3","key":"9_CR3","first-page":"425","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE TKDE 17(3), 425\u2013436 (2005)","journal-title":"IEEE TKDE"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"65:1","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos, D., Osborn, S.L.: Current research and open problems in attribute-based access control. ACM Comput. Surv. 49(4), 65:1\u201365:45 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"9_CR5","first-page":"4","volume":"17","author":"JB Joshi","year":"2005","unstructured":"Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE TKDE 17(1), 4\u201323 (2005)","journal-title":"IEEE TKDE"},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1210263.1210265","volume":"10","author":"ML Damiani","year":"2007","unstructured":"Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. ACM TISSEC 10(1), 2 (2007)","journal-title":"ACM TISSEC"},{"issue":"11","key":"9_CR7","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1093\/comjnl\/bxv034","volume":"58","author":"ASM Kayes","year":"2015","unstructured":"Kayes, A.S.M., Han, J., Colman, A.: OntCAAC: an ontology-based approach to context-aware access control for software services. Comput. J. 58(11), 3000\u20133034 (2015)","journal-title":"Comput. J."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh, S., Virtanen, S., Rodr\u00edguez, N.D., Lilius, J.: A semantic security framework and context-aware role-based access control ontology for smart spaces. In: SBD@SIGMOD, pp. 1\u20136 (2016)","DOI":"10.1145\/2928294.2928300"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-319-69462-7_10","volume-title":"On the Move to Meaningful Internet Systems. OTM 2017 Conferences","author":"A. S. M. Kayes","year":"2017","unstructured":"Kayes, A., Rahayu, W., Dillon, T., Chang, E., Han, J.: Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach. In: CoopIS 2017, vol. 10573. LNCS, pp. 132\u2013153. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69462-7_10"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lupu, E.C., Lobo, J. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18\u201338. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44569-2_2"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: SACMAT, pp. 113\u2013122 (2008)","DOI":"10.1145\/1377836.1377854"},{"issue":"5","key":"9_CR12","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1504\/IJWMC.2013.057387","volume":"6","author":"S Schefer-Wenzl","year":"2013","unstructured":"Schefer-Wenzl, S., Strembeck, M.: Modelling context-aware rbac models for mobile business processes. IJWMC 6(5), 448\u2013462 (2013)","journal-title":"IJWMC"},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M Sloman","year":"1994","unstructured":"Sloman, M.: Policy driven management for distributed systems. Journal of network and Systems Management 2(4), 333\u2013360 (1994)","journal-title":"Journal of network and Systems Management"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Chang, E., Gautama, E., Dillon, T.S.: Extended activity diagrams for adaptive workflow modelling. In: IEEE ISORC-2001, pp. 413\u2013419 (2001)","DOI":"10.1109\/ISORC.2001.922866"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"AK Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4\u20137 (2001)","journal-title":"Pers. Ubiquitous Comput."},{"key":"9_CR16","unstructured":"CPNTools: A tool for editing, simulating, and analyzing colored petri nets (2018). http:\/\/cpntools.org\/"},{"key":"9_CR17","unstructured":"Android-Studio-IDE: Android studio for building apps (2018). https:\/\/developer.android.com\/studio\/"},{"key":"9_CR18","unstructured":"SQLite: It is a self-contained and mostly used SQL database engine in the world (2018). https:\/\/www.sqlite.org\/index.html"},{"key":"9_CR19","unstructured":"PNML: The petri net markup language (PNML) is a proposal of an XML-based interchange format for petri nets (2018). http:\/\/www.pnml.org\/"},{"key":"9_CR20","unstructured":"Rissanen, E.: XACML v3.0 core and hierarchical role based access control (RBAC) profile version 1.0. In: OASIS Standard (2014). http:\/\/docs.oasis-open.org\/xacml\/3.0\/rbac\/v1.0\/xacml-3.0-rbac-v1.0.html"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Colombo, P., Ferrari, E.: Towards virtual private NoSQL datastores. In: ICDE, pp. 193\u2013204. IEEE (2016)","DOI":"10.1109\/ICDE.2016.7498240"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02922-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:47:47Z","timestamp":1775249267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02922-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029210","9783030029227"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02922-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wise2018.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}