{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:06:17Z","timestamp":1742994377051,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319590400"},{"type":"electronic","value":"9783319590417"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59041-7_2","type":"book-chapter","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T02:43:06Z","timestamp":1493865786000},"page":"24-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments"],"prefix":"10.1007","author":[{"given":"Hassan","family":"Sharghi","sequence":"first","affiliation":[]},{"given":"Ramiro","family":"Liscano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"2_CR1","unstructured":"eXtensible Access Control Markup Language (XACML), version 3.0, OASIS standard, January 2013. https:\/\/www.oasis-open.org\/"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In: ACM Symposium on Information, Computer and Communications Security, pp. 212\u2013222. ACM (2006)","DOI":"10.1145\/1128817.1128850"},{"issue":"4","key":"2_CR3","first-page":"249","volume":"14","author":"S Cirani","year":"2015","unstructured":"Cirani, S., Picone, M., Veltri, L.: A session initiation protocol for the internet of things. Sci. Int. J. Parallel Distrib. Comput. Scalable Comput. Pract. Experience 14(4), 249\u2013263 (2015). SCPE","journal-title":"Sci. Int. J. Parallel Distrib. Comput. Scalable Comput. Pract. Experience"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: An approach to supporting continuity of usage location-based access control. In: 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, pp. 199\u2013205. IEEE (2008)","DOI":"10.1109\/FTDCS.2008.17"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.datak.2011.09.001","volume":"71","author":"Y Elrakaiby","year":"2012","unstructured":"Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. Data Knowl. Eng. 71(1), 127\u2013147 (2012)","journal-title":"Data Knowl. Eng."},{"key":"2_CR6","unstructured":"Feltus, C., Petit, M., Sloman, M.: Enhancement of business IT alignment by including responsibility components in RBAC. In: CAiSE 2010 Workshop Busital 10, Hammamet, Tunisia, pp. 61\u201375 (2010)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-662-45550-0_15","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Workshops","author":"L Gomez","year":"2014","unstructured":"Gomez, L., Trabelsi, S.: Obligation based access control. In: Meersman, R. (ed.) On the Move to Meaningful Internet Systems: OTM 2014 Workshops. LNCS, vol. 8842, pp. 108\u2013116. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-45550-0_15"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., et al.: SIP: Session initiation protocol. RFC 3261 (2002). https:\/\/www.ietf.org\/rfc\/rfc3261.txt","DOI":"10.17487\/rfc3261"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Karopoulos, G., Mori, P., Martinelli, F.: Continuous authorizations in SIP with usage control. In: 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing, pp. 283\u2013287. IEEE (2012)","DOI":"10.1109\/PDP.2012.81"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.cose.2013.09.005","volume":"39","author":"G Karopoulos","year":"2013","unstructured":"Karopoulos, G., Mori, P., Martinelli, F.: Usage control in SIP-based multimedia delivery. Comput. Secur. 39, 406\u2013418 (2013). Elsevier","journal-title":"Comput. Secur."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Katt, B., Zhang, X., Breu, R., Hafner, M., Seifert, J.P.: A general obligation model and continuity-enhanced policy enforcement engine for usage control. In: The 13th ACM symposium on Access Control Models and Technologies, pp. 123\u2013132. ACM (2008)","DOI":"10.1145\/1377836.1377856"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: 13th ACM symposium on Access Control Models and Technologies, pp. 113\u2013122. ACM (2008)","DOI":"10.1145\/1377836.1377854"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Chen, H., Bertino, E.: On practical specification and enforcement of obligations. In: The second ACM conference on Data and Application Security and Privacy, pp. 71\u201382. ACM (2012)","DOI":"10.1145\/2133601.2133611"},{"issue":"6","key":"2_CR14","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TSMCA.2006.883176","volume":"36","author":"R Liscano","year":"2006","unstructured":"Liscano, R., Dersingh, A., Jost, A.G., Hu, H.: Discovering and managing access to private services in collaborative sessions. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 36(6), 1086\u20131097 (2006). IEEE","journal-title":"IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum."},{"issue":"3","key":"2_CR15","doi-asserted-by":"publisher","first-page":"439","DOI":"10.2298\/FUEE1503439M","volume":"28","author":"V Miskovic","year":"2015","unstructured":"Miskovic, V., Babic, D.: An architecture for pervasive healthcare system based on the IP multimedia subsystem and body sensor network. Facta Univ. Ser. Electron. Energetics 28(3), 439\u2013456 (2015)","journal-title":"Facta Univ. Ser. Electron. Energetics"},{"issue":"1","key":"2_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON$$_{ABC}$$ usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-73538-0_16","volume-title":"Data and Applications Security XXI","author":"I Ray","year":"2007","unstructured":"Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 211\u2013226. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73538-0_16"},{"key":"2_CR18","unstructured":"Sampemane, G., Naldur, P., Campbellg, R.H.: Access control for active spaces. In: 18th Annual Computer Security Applications Conference. ACM (2002)"},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/372346.372369","volume":"4","author":"H Schulzrinne","year":"2000","unstructured":"Schulzrinne, H., Wedlund, E.: Application-layer mobility using SIP. Mob. Comput. Commun. Rev. 4(3), 47\u201357 (2000). ACM","journal-title":"Mob. Comput. Commun. Rev."},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Sharghi, H., Sartipi, K.: An expressive event-based language for representing user behavior patterns. J. Intell. Inf. Syst. 1\u201325 (2017). doi:10.1007\/s10844-017-0456-5","DOI":"10.1007\/s10844-017-0456-5"},{"issue":"3","key":"2_CR21","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1145\/1015040.1015043","volume":"7","author":"M Strembeck","year":"2004","unstructured":"Strembeck, M., Neumann, G.: An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans. Inf. Syst. Secur. 7(3), 392\u2013427 (2004). ACM","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR22","unstructured":"Toahchoodee, M.: Access control models for pervasive computing environments. Ph.D. thesis, Colorado State University, Fort Collins, Colorado (2010)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-03007-9_22","volume-title":"Data and Applications Security XXIII","author":"M Toahchoodee","year":"2009","unstructured":"Toahchoodee, M., Abdunabi, R., Ray, I., Ray, I.: A trust-based access control model for pervasive computing applications. In: Gudes, E., Vaidya, J. (eds.) DBSec 2009. LNCS, vol. 5645, pp. 307\u2013314. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-03007-9_22"},{"issue":"5","key":"2_CR24","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1002\/sec.879","volume":"9","author":"N Ulltveit-Moe","year":"2016","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.: Enforcing mobile security with location-aware role-based access control. Secur. Commun. Netw. 9(5), 429\u2013439 (2016). Wiley","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"2_CR25","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4), 351\u2013387 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Embracing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59041-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:36:06Z","timestamp":1710354966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59041-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590400","9783319590417"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59041-7_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCETECH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcetech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mcetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}