{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:10Z","timestamp":1742912110894,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_8","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"118-138","source":"Crossref","is-referenced-by-count":3,"title":["Context-Aware Access Control in Novel Automotive HMI Systems"],"prefix":"10.1007","author":[{"given":"Simon","family":"Gansel","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Schnitzer","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Gilbeau-Hammoud","sequence":"additional","affiliation":[]},{"given":"Viktor","family":"Friesen","sequence":"additional","affiliation":[]},{"given":"Frank","family":"D\u00fcrr","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Maih\u00f6fer","sequence":"additional","affiliation":[]},{"given":"Ulrich","family":"Kr\u00e4mer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Bell, D.E., Lapadula, L.J.: Secure computer system: unified exposition and MULTICS interpretation. Technical report ESD-TR-75-306 (1976)","DOI":"10.21236\/ADA023588"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bhatti, R., et al.: A trust-based context-aware access control model for web-services. In: Proceedings, International Conference on Web Services (2004)","DOI":"10.1109\/ICWS.2004.1314738"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/JPROC.2006.888386","volume":"95","author":"M Broy","year":"2007","unstructured":"Broy, M., Kruger, I., Pretschner, A., Salzmann, C.: Engineering automotive software. Proc. IEEE 95(2), 356\u2013373 (2007)","journal-title":"Proc. IEEE"},{"key":"8_CR4","unstructured":"Corradi, A., et al.: Context-based access control for ubiquitous service provisioning. In: Proceedings of the 28th COMPSAC (2004)"},{"key":"8_CR5","unstructured":"Corradi, A., et al.: Context-based access control management in ubiquitous environments. In: Proceedings of the 3rd NCA (2004)"},{"key":"8_CR6","unstructured":"Epstein, J., et al.: A prototype B3 trusted X window system. In: Proceedings of the 7th Annual Computer Security Applications Conference (1991)"},{"key":"8_CR7","unstructured":"ESOP: on safe and efficient in-vehicle information and communication systems: update of the European statement of principles on human-machine interface. Commission of the European Communities (2008)"},{"key":"8_CR8","unstructured":"Feske, N., Helmuth, C.: Overlay window management: user interaction with multiple security domains (2004)"},{"key":"8_CR9","unstructured":"Feske, N., Helmuth, C.: A nitpicker\u2019s guide to a minimal-complexity secure GUI. In: Proceedings of the 21st ACSAC, December 2005"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Gansel, S., et al.: An access control concept for novel automotive HMI systems. In: Proceedings of the 19th SACMAT (2014)","DOI":"10.1145\/2613087.2613104"},{"key":"8_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-38853-8_18","volume-title":"Embedded Systems: Design, Analysis and Verification","author":"S Gansel","year":"2013","unstructured":"Gansel, S., Schnitzer, S., D\u00fcrr, F., Rothermel, K., Maih\u00f6fer, C.: Towards virtualization concepts for novel automotive HMI systems. In: Schirner, G., G\u00f6tz, M., Rettberg, A., Zanella, M.C., Rammig, F.J. (eds.) IESS 2013. IFIP AICT, vol. 403, pp. 193\u2013204. Springer, Heidelberg (2013)"},{"key":"8_CR12","unstructured":"Hansen, J.G.: Blink: advanced display multiplexing for virtualized applications. In: Proceedings of the 17th NOSSDAV (2007)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Herges, D., et al.: Ginger: an access control framework for telematics applications. In: Processing of the 11th TrustCom (2012)","DOI":"10.1109\/TrustCom.2012.169"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Hong-Yue, L., Miao-Lei, D., Wei-Dong, Y.: A context-aware fine-grained access control model. In: Computer Science Service System (CSSS) (2012)","DOI":"10.1109\/CSSS.2012.278"},{"key":"8_CR15","unstructured":"ISO 26262: Road vehicles - functional safety. ISO, Geneva, CH, November 2011"},{"key":"8_CR16","volume-title":"Stra\u00dfenverkehrsrecht: StVG, StVO, StVZO, Fahrzeug-ZulassungsVO, Fahrerlaubnis-VO, Verkehrszeichen","author":"H Janker","year":"2011","unstructured":"Janker, H.: Stra\u00dfenverkehrsrecht: StVG, StVO, StVZO, Fahrzeug-ZulassungsVO, Fahrerlaubnis-VO, Verkehrszeichen. Bu\u00dfgeldkatalog, Beck (2011)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/3-540-44958-2_17","volume-title":"Modeling and Using Context","author":"G Kouadri Most\u00e9faoui","year":"2003","unstructured":"Kouadri Most\u00e9faoui, G., Br\u00e9zillon, P.: A generic framework for context-based distributed authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS, vol. 2680, pp. 204\u2013217. Springer, Heidelberg (2003)"},{"issue":"5","key":"8_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/65.313011","volume":"8","author":"B Schilit","year":"1994","unstructured":"Schilit, B., Theimer, M.: Disseminating active map information to mobile hosts. IEEE Netw. 8(5), 22\u201332 (1994)","journal-title":"IEEE Netw."},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1145\/1015040.1015043","volume":"7","author":"M Strembeck","year":"2004","unstructured":"Strembeck, M., et al.: An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans. Inf. Syst. Secur. 7(3), 392\u2013427 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:03:25Z","timestamp":1559333005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}