{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:40:37Z","timestamp":1725565237961},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220572"},{"type":"electronic","value":"9783540247678"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24767-8_101","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T20:45:04Z","timestamp":1284151504000},"page":"965-974","source":"Crossref","is-referenced-by-count":0,"title":["An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics"],"prefix":"10.1007","author":[{"given":"Jongwoo","family":"Chae","sequence":"first","affiliation":[]},{"given":"Ghita Kouadri","family":"Most\u00e9faoui","sequence":"additional","affiliation":[]},{"given":"Mokdong","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"101_CR1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1590\/S0101-74382000000200008","volume":"20","author":"P. Br\u00e9zillon","year":"2002","unstructured":"Br\u00e9zillon, P., et al.: SART: An intelligent assistant for subway control. Pesquisa Operacional, Brazilian Operations Research Society\u00a020(2), 247\u2013268 (2002)","journal-title":"Pesquisa Operacional, Brazilian Operations Research Society"},{"issue":"4","key":"101_CR2","first-page":"321","volume":"18","author":"P. Br\u00e9zillon","year":"1999","unstructured":"Br\u00e9zillon, P.: Context in Artificial Intelligence: I. A survey of the literature. Computer & Artificial Intelligence\u00a018(4), 321\u2013340 (1999), http:\/\/www-poleia.lip6.fr\/~brezil\/Pages2\/Publications\/CAI1-99.pdf","journal-title":"Computer & Artificial Intelligence"},{"key":"101_CR3","unstructured":"Chung, M., Honavar, V.: A Negotiation Model in Agent-Mediated Electronic Commerce. In: Proc. IEEE Int\u2019l Symposium on Multimedia Software Engineering, Taipei, December 2000, pp. 403\u2013410 (2000)"},{"key":"101_CR4","unstructured":"Covington, M.J., et al.: A Security Architecture for Context-Aware Applications, tech. report, GIT-CC-01-12, College of Computing, Georgia Institute of Technology (May 2001)"},{"key":"101_CR5","doi-asserted-by":"crossref","unstructured":"Covington, M.J., et al.: Securing Context-Aware Applications Using Environment Roles. In: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VI, USA, May 2001, pp. 10\u201320 (2001)","DOI":"10.1145\/373256.373258"},{"key":"101_CR6","doi-asserted-by":"crossref","unstructured":"Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. Annual Computer Security Applications Conf. (ACSAC), Las Vegas, Nevada, USA (December 2002)","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"101_CR7","unstructured":"Dey, A.K.: Ph. D. dissertation, Providing Architectural Support for Building Context-Aware Applications, Georgia Institute of Technology (2000)"},{"key":"101_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/3-540-45866-2_14","volume-title":"Pervasive Computing","author":"K. Henricksen","year":"2002","unstructured":"Henricksen, K., et al.: Modeling Context Information in Pervasive Computing Systems. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol.\u00a02414, pp. 167\u2013180. Springer, Heidelberg (2002)"},{"key":"101_CR9","volume-title":"Decisions with Multiple Objectives: Preferences and Value Tradeoffs","author":"R.L. Keeney","year":"1976","unstructured":"Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)"},{"key":"101_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/3-540-44958-2_17","volume-title":"Modeling and Using Context","author":"G.K. Most\u00e9faoui","year":"2003","unstructured":"Most\u00e9faoui, G.K., Br\u00e9zillon, P.: A generic framework for context-based distributed authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS, vol.\u00a02680, pp. 204\u2013217. Springer, Heidelberg (2003)"},{"key":"101_CR11","doi-asserted-by":"crossref","unstructured":"Long, S., et al.: Rapid prototyping of mobile context-aware applications: The cyberguide case study. In: Proc. the 1996 Conf. Human Factors in Computing Systems (CHI 1996), pp. 293\u2013294 (1996)","DOI":"10.1145\/257089.257328"},{"key":"101_CR12","first-page":"119","volume-title":"Simple Heuristics That Make Us Smart","author":"L. Martignon","year":"1999","unstructured":"Martignon, L., Hoffrage, U.: Why Does One-Reason Decision Making Work? In: Simple Heuristics That Make Us Smart, pp. 119\u2013140. Oxford University Press, New York (1999)"},{"key":"101_CR13","unstructured":"Masone, C.: Role Definition Language (RDL): A Language to Describe Context-Aware Roles, tech. report, TR2001-426, Dept. of Computer Science, Dartmouth College (May 2002)"},{"key":"101_CR14","unstructured":"Osbakk, P., Ryan, N.: Context Privacy, CC\/PP, and P3P. In: Proc. UBICOMP 2002 \u2013 Workshop on Security in Ubiquitous Computing, pp. 9\u201310 (2002)"},{"key":"101_CR15","unstructured":"Rakotonirainy, A.: Context-oriented programming for pervasive systems, tech. report, University of Queensland (September 2002)"},{"key":"101_CR16","unstructured":"The SART Project, http:\/\/www-poleia.lip6.fr\/~brezil\/SART\/index.html"},{"issue":"6","key":"101_CR17","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/S0097-8493(99)00120-X","volume":"23","author":"A. Schmidt","year":"1999","unstructured":"Schmidt, A., et al.: There is more to context than location. Computers and Graphics\u00a023(6), 893\u2013902 (1999)","journal-title":"Computers and Graphics"},{"key":"101_CR18","unstructured":"Sch\u00e4fer, R.: Rules for Using Multi-Attribute Utility Theory for Estimating a User\u2019s Interests. In: Proc. 9th GI-Workshop. ABIS-Adaptivit\u00e4t und Benutzermodellierung in interaktiven software systemen, Dortmund, Germany (2001)"},{"key":"101_CR19","unstructured":"Shankar, N., Balfanz, D.: Enabling Secure Ad-hoc Communication Using Context-Aware Security Services (Extended Abstract). In: Proc. UBICOMP 2002 \u2013 Workshop on Security in Ubiquitous Computing (2002)"},{"key":"101_CR20","volume-title":"Context-Based Vision","author":"T.M. Strat","year":"1997","unstructured":"Strat, T.M., et al.: RADIUS: Image Understanding for Intelligence Imagery. In: Firschein, O., Strat, T.M. (eds.) Context-Based Vision, Morgan Kaufmann, San Francisco (1997)"},{"key":"101_CR21","volume-title":"Decision Analysis and Behavioral Research","author":"D. Winterfeld von","year":"1986","unstructured":"von Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge (1986)"},{"issue":"3","key":"101_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st Century. Scientific American\u00a0265(3), 66\u201375 (1991)","journal-title":"Scientific American"},{"issue":"3","key":"101_CR23","first-page":"33","volume":"1","author":"S.S. Yau","year":"2002","unstructured":"Yau, S.S., et al.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing, joint special issue with IEEE Personal Communications\u00a01(3), 33\u201340 (2002)","journal-title":"IEEE Pervasive Computing, joint special issue with IEEE Personal Communications"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24767-8_101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:55:20Z","timestamp":1605743720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24767-8_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220572","9783540247678"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24767-8_101","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}