{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:41:22Z","timestamp":1766486482640,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_56","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:56:55Z","timestamp":1500973015000},"page":"710-720","source":"Crossref","is-referenced-by-count":6,"title":["A Role-Based Access Control System for Intelligent Buildings"],"prefix":"10.1007","author":[{"given":"Nian","family":"Xue","sequence":"first","affiliation":[]},{"given":"Chenglong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"56_CR1","unstructured":"He, X.-X.: Fingerprint access control in intelligent building application and implementation. Comput. Knowl. Technol. (2010)"},{"issue":"2","key":"56_CR2","first-page":"38","volume":"29","author":"RS Sandhu","year":"2003","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., et al.: Role-based access controls. Comput. Sci. 29(2), 38\u201347 (2003)","journal-title":"Comput. Sci."},{"issue":"2","key":"56_CR3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85\u2013106 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"56_CR4","first-page":"69","volume":"26","author":"Z Liu","year":"2009","unstructured":"Liu, Z., Zou, Z.: A survey of aeneral temporal RBAC studying. J. Chongqing Normal Univ. 26(3), 69\u201371 (2009)","journal-title":"J. Chongqing Normal Univ."},{"key":"56_CR5","unstructured":"Song, L., Zhang, X., Lv, X.: The implementation of a new RBAC. Comput. Knowl. Technol. (2009)"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Xue, N., Liang, L., Zhang, J., Huang, X.: An access control system for intelligent buildings. In: EAI International Conference on Mobile Multimedia Communications. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 11\u201317 (2016)","DOI":"10.4108\/eai.18-6-2016.2264493"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Maciel, H.S., Cardoso, I., Silva, D.F., et al.: An embedded access control system for restricted areas in smart buildings. In: International Multidisciplinary Conference on Computer and Energy Science, pp. 1\u20136 (2016)","DOI":"10.1109\/SpliTech.2016.7555926"},{"issue":"2","key":"56_CR8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1002\/sec.971","volume":"8","author":"Y-F Chang","year":"2015","unstructured":"Chang, Y.-F.: A flexible hierarchical access control mechanism enforcing extension policies. Secur. Commun. Netw. 8(2), 189\u2013201 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"56_CR9","doi-asserted-by":"crossref","first-page":"84","DOI":"10.4018\/IJISP.2015070105","volume":"9","author":"R Xu","year":"2015","unstructured":"Xu, R., Huang, X., Zhang, J., Lu, Y., Wu, G., Yan, Z.: Software defined intelligent building. Int. J. Inf. Secur. Priv. (IJISP) 9(3), 84\u201399 (2015)","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Xue, N., Huang, X., Zhang, J.: S2Net: a security framework for software defined intelligent building networks. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016), Tianjin, China (2016)","DOI":"10.1109\/TrustCom.2016.0122"},{"issue":"16","key":"56_CR11","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1002\/sec.1259","volume":"9","author":"X Huang","year":"2015","unstructured":"Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the internet of things. Secur. Commun. Netw. 9(16), 3083\u20133094 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"56_CR12","unstructured":"Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.W.: User interactive internet of things privacy preserved access control. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), London, UK (2012)"},{"key":"56_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-10665-1_50","volume-title":"Cloud Computing","author":"X Huang","year":"2009","unstructured":"Huang, X., He, Y., Hou, Y., Li, L., Sun, L., Zhang, S., Jiang, Y., Zhang, T.: Privacy of value-added context-aware service cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 547\u2013552. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10665-1_50"},{"key":"56_CR14","doi-asserted-by":"crossref","unstructured":"Huang, X., Zhang, T., Hou, Y.: ID management among clouds. In: The First International Conference on Future Information Networks, Beijing, China, October 2009","DOI":"10.1109\/ICFIN.2009.5339583"},{"key":"56_CR15","doi-asserted-by":"crossref","unstructured":"Lowe, G., Dilloway, C., Mei, L.H.: Casper: a compiler for the analysis of security protocols. In: Computer Security Foundations Workshop IEEE Computer, vol. 6, pp. 18\u201330 (2009)","DOI":"10.1109\/CSFW.1997.596779"},{"key":"56_CR16","doi-asserted-by":"crossref","unstructured":"Bo, W., Li, M., Peng, X.P., Li, X., Huang, X.: A smart power system. In: International Conference on Mechanical Engineering and Intelligent Systems (2015)","DOI":"10.2991\/icmeis-15.2015.74"},{"issue":"2","key":"56_CR17","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s11036-008-0143-4","volume":"14","author":"C Gao","year":"2009","unstructured":"Gao, C., Yu, Z., Wei, Y., Russell, S., Guan, Y.: A statistical indoor localization method for supporting location-based access control. Mob. Netw. Appl. 14(2), 253\u2013263 (2009)","journal-title":"Mob. Netw. Appl."},{"issue":"4","key":"56_CR18","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1109\/TITB.2004.837887","volume":"8","author":"MD Rodriguez","year":"2004","unstructured":"Rodriguez, M.D., et al.: Location-aware access to hospital information and services. IEEE Trans. Inf. Technol. Biomed. Publ. IEEE Eng. Med. Biol. Soc. 8(4), 448\u2013455 (2004)","journal-title":"IEEE Trans. Inf. Technol. Biomed. Publ. IEEE Eng. Med. Biol. Soc."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T17:45:50Z","timestamp":1750787150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}