{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:56:53Z","timestamp":1760043413495},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116976"},{"type":"electronic","value":"9783319116983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11698-3_39","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T05:18:13Z","timestamp":1412831893000},"page":"501-509","source":"Crossref","is-referenced-by-count":8,"title":["Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework"],"prefix":"10.1007","author":[{"given":"Nathalie","family":"Baracaldo","sequence":"first","affiliation":[]},{"given":"Balaji","family":"Palanisamy","sequence":"additional","affiliation":[]},{"given":"James","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Opengis simple features specification for sql, tech. report ogc 99-049. Technical report, OpenGIS Consortium (1999)"},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.cose.2013.08.001","volume":"39","author":"N. Baracaldo","year":"2013","unstructured":"Baracaldo, N., Joshi, J.: An adaptive risk management and access control framework to mitigate insider threats. Computers & Security\u00a039, 237\u2013254 (2013)","journal-title":"Computers & Security"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: Geo-rbac: a spatially aware rbac. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 29\u201337. ACM (2005)","DOI":"10.1145\/1063979.1063985"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proc. of the 14th SACMAT, pp. 177\u2013186. ACM (2009)","DOI":"10.1145\/1542207.1542237"},{"key":"39_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/11581062_27","volume-title":"Web Information Systems Engineering \u2013 WISE 2005","author":"S.M. Chandran","year":"2005","unstructured":"Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A location and time-based RBAC model. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, J.-Y., Sheng, Q.Z. (eds.) WISE 2005. LNCS, vol.\u00a03806, pp. 361\u2013375. Springer, Heidelberg (2005)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proc. of the 6th SACMAT, pp. 10\u201320. ACM (2001)","DOI":"10.1145\/373256.373258"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04, 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proc. of the First ACM Conference on Data and Application Security and Privacy, pp. 191\u2013202. ACM (2011)","DOI":"10.1145\/1943513.1943539"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, A., Kirkpatrick, M.S., Bertino, E.: A formal proximity model for rbac systems. Computers & Security (2013)","DOI":"10.4108\/icst.collaboratecom.2012.250453"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Kirkpatrick, M.S., Damiani, M.L., Bertino, E.: Prox-rbac: a proximity-based spatially aware rbac. In: Proc. of the 19th ACM SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems (2011)","DOI":"10.1145\/2093973.2094018"},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11961635_10","volume-title":"Information Systems Security","author":"I. Ray","year":"2006","unstructured":"Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 147\u2013161. Springer, Heidelberg (2006)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Osborn, Q.M.S., Sandhu, R.: Configuring role-based access control to enforce mandatory and discretionary access control policies. In: ACM Transaction on Information and System Security (2000)","DOI":"10.1145\/354876.354878"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role activation hierarchies. In: Proceedings of 3rd ACM Workshop on Role-Based Access Control (1998)","DOI":"10.1145\/286884.286891"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Tarameshloo, E., Fong, P.: Access control models for geo-social computing systems. In: SACMAT (2014)","DOI":"10.1145\/2613087.2613098"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Thomas, R.K.: Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments. In: Proc. of the 2nd ACM Workshop on Role-Based Access Control (1997)","DOI":"10.1145\/266741.266748"},{"key":"39_CR16","unstructured":"Toahchoodee, M., Ray, I., McConnell, R.M.: Using graph theory to represent a spatio-temporal role-based access control model. Int. Journal of Next-Generation Computing (2010)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11698-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:11:58Z","timestamp":1559013118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11698-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116976","9783319116983"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11698-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}