{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:26:10Z","timestamp":1743099970836,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030939557"},{"type":"electronic","value":"9783030939564"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-93956-4_9","type":"book-chapter","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T08:03:00Z","timestamp":1641974580000},"page":"144-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital Twin Monitoring for Cyber-Physical Access Control"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7488-2750","authenticated-orcid":false,"given":"Brian","family":"Greaves","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9157-3079","authenticated-orcid":false,"given":"Marijke","family":"Coetzee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9015-6329","authenticated-orcid":false,"given":"Wai Sze","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"key":"9_CR1","first-page":"466","volume":"15","author":"C Tsigkanos","year":"2016","unstructured":"Tsigkanos, C., Pasquale, L., Ghezzi, C., Nuseibeh, B.: On the interplay between cyber and physical spaces for adaptive security 15, 466\u2013480 (2016)","journal-title":"On the interplay between cyber and physical spaces for adaptive security"},{"key":"9_CR2","first-page":"40","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice 32, 40\u201348 (1994)","journal-title":"Access control: principle and practice"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Role-based access control. In: Advances in Computers, vol. 46, pp. 237\u2013286 (1998)","DOI":"10.1016\/S0065-2458(08)60206-5"},{"issue":"13","key":"9_CR4","doi-asserted-by":"publisher","first-page":"3015","DOI":"10.3390\/s19133015","volume":"19","author":"F Ullah","year":"2019","unstructured":"Ullah, F., et al.: Barrier access control using sensors platform and vehicle license plate characters recognition. Sensors 19(13), 3015 (2019)","journal-title":"Sensors"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Satoh, I.: Spatial connector: mapping access control models for pervasive computing and cloud computing. In: FNC\/MobiSPC, pp.174\u2013181 (2017)","DOI":"10.1016\/j.procs.2017.06.075"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Kouyoumdjieva, S.T., Karlsson, G.: Experimental evaluation of precision of a proximity-based indoor positioning system. In: 2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 130\u2013137 (2019)","DOI":"10.23919\/WONS.2019.8795488"},{"issue":"13","key":"9_CR7","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.3390\/s19132891","volume":"19","author":"B Jang","year":"2019","unstructured":"Jang, B., Kim, H., Kim, J.W.: IPSCL: an accurate indoor positioning algorithm using sensors and crowdsourced landmarks. Sensors 19(13), 2891 (2019)","journal-title":"Sensors"},{"issue":"9","key":"9_CR8","doi-asserted-by":"publisher","first-page":"1659","DOI":"10.1007\/s00500-014-1278-9","volume":"18","author":"JL Hern\u00e1ndez","year":"2014","unstructured":"Hern\u00e1ndez, J.L., Moreno, M.V., Jara, A.J., Skarmeta, A.F.: A soft computing based location-aware access control for smart buildings. Soft. Comput. 18(9), 1659\u20131674 (2014). https:\/\/doi.org\/10.1007\/s00500-014-1278-9","journal-title":"Soft. Comput."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Cook, D., Das, S.K.:\u00a0Smart Environments: Technology, Protocols, and Applications,\u00a0vol. 43. Wiley, Hoboken (2004)","DOI":"10.1002\/047168659X"},{"key":"9_CR10","unstructured":"Grieves, M.: Digital twin: manufacturing excellence through virtual factory replication. White Paper, vol. 1, pp. 1\u20137 (2014)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Van Der Horn, E., Mahadevan, S.: Digital Twin: generalization, characterization and implementation. Decis. Support Syst. 145, 113524 (2021)","DOI":"10.1016\/j.dss.2021.113524"},{"issue":"9-12","key":"9_CR12","doi-asserted-by":"publisher","first-page":"3563","DOI":"10.1007\/s00170-017-0233-1","volume":"94","author":"F Tao","year":"2017","unstructured":"Tao, F., Cheng, J., Qi, Q., Zhang, M., Zhang, H., Sui, F.: Digital twin-driven product design, manufacturing and service with big data. Int. J. Adv. Manuf. Technol. 94(9\u201312), 3563\u20133576 (2017). https:\/\/doi.org\/10.1007\/s00170-017-0233-1","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"26637","DOI":"10.1109\/ACCESS.2020.2971576","volume":"8","author":"BR Barricelli","year":"2020","unstructured":"Barricelli, B.R., Casiraghi, E., Gliozzo, J., Petrini, A., Valtolina, S.: Human digital twin for fitness management. IEEE Access 8, 26637\u201326664 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3390\/buildings11040151","volume":"11","author":"SM Sepasgozar","year":"2021","unstructured":"Sepasgozar, S.M.: Differentiating digital twin from digital shadow: elucidating a paradigm shift to expedite a smart, sustainable built environment. Buildings 11(4), 151 (2021)","journal-title":"Buildings"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Sengan, S., Kumar, K., Subramaniyaswamy, V., Ravi, L.: Cost-effective and efficient 3D human model creation and re-identification application for human digital twins. Multimedia Tools Appl., 1\u201318 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10842-y","DOI":"10.1007\/s11042-021-10842-y"},{"key":"9_CR16","unstructured":"Rajkamal, M., Swathi, D., Prabu, S., Mohanapriya, P.: Enhanced cyber physical security based automatic generation control with renewable energy system. Ann. Romanian Soc. Cell Biol. 25, 15915\u201315925 (2021)"},{"issue":"10","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1093\/comjnl\/bxs098","volume":"55","author":"N Skandhakumar","year":"2012","unstructured":"Skandhakumar, N., Reid, J., Dawson, E., Drogemuller, R., Salim, F.: An authorization framework using building information models. Comput. J. 55(10), 1244\u20131264 (2012)","journal-title":"Comput. J."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In:\u00a0Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 212\u2013222 (2006)","DOI":"10.1145\/1128817.1128850"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Yamanaka, G., et al.: Geo-fencing in wireless LANs with camera for location-based access control. In:\u00a02019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20134 (2019)","DOI":"10.1109\/CCNC.2019.8651877"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Lang, U., Schreiner, R.: Proximity-based access control (PBAC) using model-driven security. In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) ISSE 2015, pp. 157\u2013170. Springer, Wiesbaden (2015). https:\/\/doi.org\/10.1007\/978-3-658-10934-9_14","DOI":"10.1007\/978-3-658-10934-9_14"},{"key":"9_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-38323-6_13","volume-title":"Trust Management VII","author":"C Jensen","year":"2013","unstructured":"Jensen, C., Geneser, K., Willemoes-Wissing, I.: Sensor enhanced access control: extending traditional access control models with context-awareness. In: Fern\u00e1ndez-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IAICT, vol. 401, pp. 177\u2013192. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38323-6_13"},{"key":"9_CR22","first-page":"1067","volume":"37","author":"H Liu","year":"2007","unstructured":"Liu, H., Darabi, H., Banerjee, P., Liu, J.: Survey of wireless indoor positioning techniques and systems 37, 1067\u20131080 (2007)","journal-title":"Survey of wireless indoor positioning techniques and systems"},{"key":"9_CR23","unstructured":"Ijaz, F., Yang, H.K., Ahmad, A.W., Lee, C.: Indoor positioning: a review of indoor ultrasonic positioning systems. Presented at the 2013 15th International Conference on Advanced Communications Technology (ICACT), pp. 1146\u20131150 (2013)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Duque Domingo, J., Cerrada, C., Valero, E., Cerrada, J.A.: Indoor positioning system using depth maps and wireless networks. J. Sens. 2016 (2016)","DOI":"10.1155\/2016\/2107872"},{"key":"9_CR25","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-981-15-0637-6_24","volume-title":"Fourth International Congress on Information and Communication Technology","author":"B Greaves","year":"2020","unstructured":"Greaves, B., Coetzee, M., Leung, W.: A comparison of indoor positioning systems for access control using virtual perimeters. In: Yang, X.-S., Sherratt, S., Dey, N., Joshi, A. (eds.) Fourth International Congress on Information and Communication Technology. AISC, vol. 1041, pp. 293\u2013302. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0637-6_24"},{"key":"9_CR26","first-page":"114","volume":"2017","author":"E Young-Hyun","year":"2017","unstructured":"Young-Hyun, E., Young-Keun, C., Cho, S., Jeon, B.: FloGeo: a floatable three-dimensional geofence with mobility for the internet of things. Control Syst. 2017, 114\u2013120 (2017)","journal-title":"Control Syst."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Pe\u0161i\u0107, S., To\u0161i\u0107, M., Ikovi\u0107, O., Radovanovi\u0107, M., Ivanovi\u0107, M., Bo\u0161kovi\u0107, D.: GEMAT-internet of things solution for indoor security geofencing. Presented at the Proceedings of the 9th Balkan Conference on Informatics, pp. 1\u20138 (2019)","DOI":"10.1145\/3351556.3351558"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-319-98385-1_13","volume-title":"Trust, Privacy and Security in Digital Business","author":"B Greaves","year":"2018","unstructured":"Greaves, B., Coetzee, M., Leung, W.: Access control requirements for physical spaces protected by virtual perimeters. In: Furnell, S., Mouratidis, H., Pernul, G. (eds.) TrustBus. LNCS, vol. 11033, pp. 182\u2013197. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98385-1_13"},{"issue":"16","key":"9_CR29","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1016\/j.comcom.2012.06.004","volume":"35","author":"G Deak","year":"2012","unstructured":"Deak, G., Curran, K., Condell, J.: A survey of active and passive indoor localization systems. Comput. Commun. 35(16), 1939\u20131954 (2012)","journal-title":"Comput. Commun."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Yamanaka, G., et al.: Geo-fencing in wireless LANs with camera for location-based access control. Presented at the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20134 (2019)","DOI":"10.1109\/CCNC.2019.8651877"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Yap, R.H., Sim, T., Kwang, G.X., Ramnath, R.: Physical access protection using continuous authentication. Presented at the 2008 IEEE Conference on Technologies for Homeland Security, pp. 510\u2013512 (2008)","DOI":"10.1109\/THS.2008.4534505"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Azarbayejani, A., Pentland, A.: Real-time self-calibrating stereo person tracking using 3-D shape estimation from blob features. Presented at the Proceedings of 13th International Conference on Pattern Recognition, vol. 3, pp. 627\u2013632 (1996)","DOI":"10.1109\/ICPR.1996.547022"},{"key":"9_CR33","unstructured":"ZED Stereo Camera. https:\/\/www.stereolabs.com\/zed. Accessed 11 Apr 2021"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Wojke, N., Bewley, A.: Deep cosine metric learning for person re-identification. In:\u00a02018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 748\u2013756 (2018)","DOI":"10.1109\/WACV.2018.00087"},{"key":"9_CR35","unstructured":"ZED Spatial Mapping Module. https:\/\/www.stereolabs.com\/docs\/api\/group__SpatialMapping__group.html. Accessed 11 Apr 2021"},{"key":"9_CR36","unstructured":"Tensorflow Object Detection API. https:\/\/github.com\/tensorflow\/models\/tree\/master\/research\/object_detection. Accessed 11 Apr 2021"},{"key":"9_CR37","unstructured":"CUDA 10.1. https:\/\/developer.nvidia.com\/cuda-10.1-download-archive-base. Accessed 11 Apr 2021"},{"key":"9_CR38","unstructured":"ZED SDK. https:\/\/www.stereolabs.com\/developers\/release. Accessed 11 Apr 2021"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Gupta, T., Li, H.: Indoor mapping for smart cities\u2014an affordable approach: using Kinect Sensor and ZED stereo camera. In:\u00a02017 International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 1\u20138 (2017)","DOI":"10.1109\/IPIN.2017.8115909"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93956-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T04:29:39Z","timestamp":1651811379000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93956-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030939557","9783030939564"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93956-4_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}