{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:02:40Z","timestamp":1743156160703,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_86","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T04:20:32Z","timestamp":1521519632000},"page":"966-975","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Complex Event Processing and Role-Based Access Control Implementation in ESN Middleware"],"prefix":"10.1007","author":[{"given":"Yassir","family":"Rouchdi","sequence":"first","affiliation":[]},{"given":"Khalid","family":"El Yassini","sequence":"additional","affiliation":[]},{"given":"Kenza","family":"Oufaska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"86_CR1","doi-asserted-by":"crossref","unstructured":"Ajana, M., Boulmalf, M., Harroud, H., Hamam, H.: A policy based event management middleware for implementing RFID applications. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2009)","DOI":"10.1109\/WiMob.2009.75"},{"key":"86_CR2","unstructured":"United States Government Accountability Office: INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government. United States Government Accountability Office, May 2005. http:\/\/epic.org\/privacy\/surveillance\/spotlight\/0806\/gao05551.pdf"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Sheng, Q., Li, X., Zeadally, S.: Enabling next-generation RFID applications: solutions and challenges. Computer 41(9) (2008)","DOI":"10.1109\/MC.2008.386"},{"key":"86_CR4","unstructured":"Al-Mousawi, H.: Performance and reliability of Radio Frequency Identification (RFID)\u201d, in Agder University College, June 2004. http:\/\/student.grm.hia.no\/master\/ikt04\/ikt6400\/g28\/Document\/Master_Thesis.pdf"},{"key":"86_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03819-8_31","volume":"13","author":"N Kefalakis","year":"2009","unstructured":"Kefalakis, N., Leontiadis, N., Soldatos, J., Donsez, D.: Middleware building blocks for architecting RFID systems. Mob. Lightweight Wirel. Syst. 13, 325\u2013336 (2009)","journal-title":"Mob. Lightweight Wirel. Syst."},{"key":"86_CR6","doi-asserted-by":"crossref","unstructured":"Su, X., Chu, C.-C., Prabhu, B.S., Gadh, R.: On the creation of automatic identification and data capture infrastructure via RFID and other technologies. In: Yan, L., Zhang, Y., Yang, L.T., Ning, H. (eds.) The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems, p. 24. Auerbach Publications, Taylor & Francis Group (2007)","DOI":"10.1201\/9781420052824.ch2"},{"key":"86_CR7","doi-asserted-by":"crossref","unstructured":"Bornh\u00f6vd, M.C., Lin, T., Haller, S., Schaper, J.: Integrating automatic data acquisition with business processes - experiences with SAP\u2019s auto-ID infrastructure. In: Proceedings of the 30th International Conference on Very Large Data Bases (VLDB), Toronto (2004)","DOI":"10.1016\/B978-012088469-8\/50103-0"},{"key":"86_CR8","first-page":"6","volume-title":"RFID Technology and Applications","author":"S Bell","year":"2011","unstructured":"Bell, S.: RFID Technology and Applications, pp. 6\u20138. Cambridge University Press, London (2011)"},{"key":"86_CR9","unstructured":"Catherine O\u2019Connor, M.: RFID is the key to car clubs success. RFID J. (2011)"},{"key":"86_CR10","first-page":"38","volume":"28","author":"R Russell","year":"2004","unstructured":"Russell, R.: Manufacturing execution systems: moving to the next level. Pharm. Technol. 28, 38\u201350 (2004)","journal-title":"Pharm. Technol."},{"key":"86_CR11","unstructured":"Darwish, M.: Analysis of ANSI RBAC support in commercial middleware. Ph.D. thesis, University of British Columbia, Vancouver, Canada, April 2009"},{"key":"86_CR12","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D.F., Kuhn, D.R.: The NIST model for role-based access control: toward a unified standard. In: 5th ACM Workshop Role-Based Access Control, pp. 47\u201363, July 2000","DOI":"10.1145\/344287.344301"},{"issue":"6","key":"86_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MSP.2007.173","volume":"5","author":"DF Ferraiolo","year":"2007","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Sandhu, R.: RBAC standard rationale: comments on a critique of the ANSI standard on role-based access control. IEEE Secur. Priv. 5(6), 51\u201353 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"86_CR14","unstructured":"Thiell, M., Zuluaga, J., Montanez, J., van Hoof, B.: Green logistics \u2013 global practices and their implementation in emerging markets, p. 2, Colombia (2011)"},{"issue":"2","key":"86_CR15","first-page":"38","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coynek, E.J., Feinsteink, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"Role-based access control models. IEEE Comput."},{"key":"86_CR16","unstructured":"Sandhu, R.: Role-Based Access Control (RBAC). CS 6393 Lecture 3, 29 January 2016"},{"issue":"1","key":"86_CR17","doi-asserted-by":"crossref","first-page":"106","DOI":"10.3390\/jtaer3010011","volume":"3","author":"T Zhang","year":"2008","unstructured":"Zhang, T., Ouyang, Y., He, Y.: Traceable air baggage handling system based on RFID tags in the airport. J. Theoret. Appl. Electron. Commer. Res. 3(1), 106\u2013115 (2008). School of Computer Science and Engineering, Beijing University of Aeronautics and Astronautics, China","journal-title":"J. Theoret. Appl. Electron. Commer. Res."},{"key":"86_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MITP.2013.37","volume":"15","author":"R Weil","year":"2013","unstructured":"Weil, R., Coyne, E.: ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof. 15, 14\u201316 (2013)","journal-title":"IT Prof."},{"key":"86_CR19","doi-asserted-by":"publisher","first-page":"374","DOI":"10.17706\/IJCCE.2016.5.5.374-380","volume":"5","author":"C Jin","year":"2016","unstructured":"Jin, C., Shen, A., Yu, W.: The RBAC system based on role risk and user trust. Int. J. Comput. Commun. Eng. 5, 374 (2016)","journal-title":"Int. J. Comput. Commun. Eng."}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_86","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T13:16:52Z","timestamp":1660655812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_86","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"21 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCAMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Mediterranean Symposium on Smart City Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tangier","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scams2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.medi-ast.org\/scams17\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}