{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:17:34Z","timestamp":1749010654979,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319396385"},{"type":"electronic","value":"9783319396392"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39639-2_29","type":"book-chapter","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T07:25:00Z","timestamp":1466148300000},"page":"333-342","source":"Crossref","is-referenced-by-count":1,"title":["Clustering Context Items into User Trust Levels"],"prefix":"10.1007","author":[{"given":"Pawe\u0142","family":"Lubomski","sequence":"first","affiliation":[]},{"given":"Henryk","family":"Krawczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,18]]},"reference":[{"unstructured":"Benantar, M.: Access control systems. In: Security, Identity Management and Trust Models. Springer (2006)","key":"29_CR1"},{"issue":"6","key":"29_CR2","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/S0167-4048(03)00609-6","volume":"22","author":"E Bertino","year":"2003","unstructured":"Bertino, E.: RBAC models\u2014concepts and trends. Comput. Secur. 22(6), 511\u2013514 (2003)","journal-title":"Comput. Secur."},{"unstructured":"Ricci, A., Viroli, M., Omicini, A.: An RBAC approach for securing access control in a mas coordination infrastructure. In: 1st International Workshop Safety and Security in MultiAgent Systems (SASEMAS 2004), pp. 110\u2013124 (2004)","key":"29_CR3"},{"issue":"1","key":"29_CR4","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","volume":"18","author":"R Bhatti","year":"2005","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases 18(1), 83\u2013105 (2005)","journal-title":"Distrib. Parallel Databases"},{"doi-asserted-by":"crossref","unstructured":"Khan, M.F.F., Sakamura, K.: Context-aware access control for clinical information systems. In: 2012 International Conference on Innovations in Information Technology (IIT), pp. 123\u2013128 (2012)","key":"29_CR5","DOI":"10.1109\/INNOVATIONS.2012.6207715"},{"issue":"3","key":"29_CR6","first-page":"185","volume":"34","author":"H Krawczyk","year":"2013","unstructured":"Krawczyk, H., Lubomski, P.: CoRBAC\u2014context-oriented security model (in Polish). Studia Informatica 34(3), 185\u2013194 (2013)","journal-title":"Studia Informatica"},{"doi-asserted-by":"crossref","unstructured":"Huang, X., Wang, H., Chen, Z., Lin, J.: A context, rule and role-based access control model in enterprise pervasive computing environment. In: 2006 First International Symposium on Pervasive Computing and Applications, pp. 497\u2013502 (2006)","key":"29_CR7","DOI":"10.1109\/SPCA.2006.297443"},{"doi-asserted-by":"crossref","unstructured":"Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security\u2014AISec\u201910, p. 19 (2010)","key":"29_CR8","DOI":"10.1145\/1866423.1866428"},{"doi-asserted-by":"crossref","unstructured":"Gupta, A., Miettinen, M., Asokan, N., Nagy, M.: Intuitive security policy configuration in mobile devices using context profiling. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 471\u2013480 (2012)","key":"29_CR9","DOI":"10.1109\/SocialCom-PASSAT.2012.60"},{"issue":"October","key":"29_CR10","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2002.1039860","volume":"40","author":"C Manikopoulos","year":"2002","unstructured":"Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun. Mag. 40(October), 76\u201382 (2002)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"29_CR11","first-page":"1","volume":"6","author":"S Capitani Di De","year":"2012","unstructured":"De Capitani Di, S., Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, G.Psaila, Samarati, P.: Integrating trust management and access control in data-intensive Web applications. ACM Trans. Web 6(2), 1\u201343 (2012)","journal-title":"ACM Trans. Web"},{"doi-asserted-by":"crossref","unstructured":"Woo, J.W., Hwang, M.J., Lee, C.G., Youn, H.Y.: Dynamic role-based access control with trust-satisfaction and reputation for multi-agent system. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp. 1121\u20131126 (2010)","key":"29_CR12","DOI":"10.1109\/WAINA.2010.63"},{"doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Lubomski, P.: User trust levels and their impact on system security and usability. In: Communications in Computer and Information Science. Springer International Publishing, pp. 82\u201391 (2015)","key":"29_CR13","DOI":"10.1007\/978-3-319-19419-6_8"},{"issue":"12","key":"29_CR14","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1353-4858(10)70147-1","volume":"2010","author":"S Furnell","year":"2010","unstructured":"Furnell, S.: Usability versus complexity\u2014striking the balance in end-user security. Netw. Secur. 2010(12), 13\u201317 (2010)","journal-title":"Netw. Secur."},{"doi-asserted-by":"crossref","unstructured":"Pahnila, S.P.S., Siponen, M.S.M., Mahmood, A.M.A.: Employees\u2019 behavior towards IS security policy compliance. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS\u201907) (2007)","key":"29_CR15","DOI":"10.1109\/HICSS.2007.206"},{"doi-asserted-by":"crossref","unstructured":"Lubomski, P.: Context in security of distributed e-service environments. In: Proceedings of the Chip to Cloud Security Forum 2014, p. 18 (2014)","key":"29_CR16","DOI":"10.1016\/S1353-4858(14)70010-8"},{"unstructured":"Lubomski, P., Krawczyk, H.: Practical evaluation of security mechanisms of Internet systems (in review). IEEE Secur. Privacy Mag.","key":"29_CR17"},{"doi-asserted-by":"crossref","unstructured":"Adams, R.P.: Hierarchical Agglomerative Clustering (2016)","key":"29_CR18","DOI":"10.1155\/2016\/1879327"},{"issue":"2","key":"29_CR19","first-page":"78","volume":"17","author":"SP Borgatti","year":"1994","unstructured":"Borgatti, S.P.: How to explain hierarchical clustering. Connections 17(2), 78\u201380 (1994)","journal-title":"Connections"},{"issue":"5","key":"29_CR20","doi-asserted-by":"crossref","first-page":"2785","DOI":"10.1016\/j.eswa.2014.09.054","volume":"42","author":"A Bouguettaya","year":"2015","unstructured":"Bouguettaya, A., Yu, Q., Liu, X., Zhou, X., Song, A.: Efficient agglomerative hierarchical clustering. Expert Syst. Appl. 42(5), 2785\u20132797 (2015)","journal-title":"Expert Syst. Appl."},{"unstructured":"Wessa, P.: Free statistics software, office for research development and education version 1.1.23-r7, 2016. http:\/\/www.wessa.net\/","key":"29_CR21"},{"unstructured":"Hartigan, J.A., Wong, M.A.: A K-Means clustering algorithm. J. Roy. Stat. Soc. 28(1), 100\u2013108 (1979)","key":"29_CR22"},{"doi-asserted-by":"crossref","unstructured":"Comaniciu, D., Meer, P.: Mean shift analysis and applications. In: Proceedings of the Seventh IEEE International Conference on Computer Vision, vol. 2, pp. 1197\u20131203 (1999)","key":"29_CR23","DOI":"10.1109\/ICCV.1999.790416"}],"container-title":["Advances in Intelligent Systems and Computing","Dependability Engineering and Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39639-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T22:02:09Z","timestamp":1748988129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39639-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319396385","9783319396392"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39639-2_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}