{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:26Z","timestamp":1725565346600},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_106","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"983-993","source":"Crossref","is-referenced-by-count":0,"title":["An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics"],"prefix":"10.1007","author":[{"given":"Jongwoo","family":"Chae","sequence":"first","affiliation":[]},{"given":"Ghita Kouadri","family":"Most\u00e9faoui","sequence":"additional","affiliation":[]},{"given":"Mokdong","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"106_CR1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1590\/S0101-74382000000200008","volume":"20","author":"P. Br\u00e9zillon","year":"2002","unstructured":"Br\u00e9zillon, P., et al.: SART: An intelligent assistant for subway control. Pesquisa Operacional, Brazilian Operations Research Society\u00a020(2), 247\u2013268 (2002)","journal-title":"Pesquisa Operacional, Brazilian Operations Research Society"},{"issue":"4","key":"106_CR2","first-page":"321","volume":"18","author":"P. Br\u00e9zillon","year":"1999","unstructured":"Br\u00e9zillon, P.: Context in Artificial Intelligence: I. A survey of the literature. Computer & Artificial Intelligence\u00a018(4), 321\u2013340 (1999), http:\/\/wwwpoleia.lip6.fr\/~brezil\/Pages2\/Publications\/CAI1-99.pdf","journal-title":"Computer & Artificial Intelligence"},{"doi-asserted-by":"crossref","unstructured":"Chung, M., Honavar, V.: A Negotiation Model in Agent-Mediated Electronic Commerce. In: Proc. IEEE Int\u2019l Symposium on Multimedia Software Engineering, Taipei, December 2000, pp. 403\u2013410 (2000)","key":"106_CR3","DOI":"10.1109\/MMSE.2000.897242"},{"unstructured":"Covington, M.J., et al.: A Security Architecture for Context-Aware Applications, tech. report, GIT-CC-01-12, College of Computing, Georgia Institute of Technology (May 2001)","key":"106_CR4"},{"doi-asserted-by":"crossref","unstructured":"Covington, M.J., et al.: Securing Context-Aware Applications Using Environment Roles. In: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VI, USA, May 2001, pp. 10\u201320 (2001)","key":"106_CR5","DOI":"10.1145\/373256.373258"},{"doi-asserted-by":"crossref","unstructured":"Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. Annual Computer Security Applications Conf (ACSAC), Las Vegas, Nevada, USA (December 2002)","key":"106_CR6","DOI":"10.1109\/CSAC.2002.1176296"},{"unstructured":"Dey, A.K.: Ph. D. dissertation, Providing Architectural Support for Building Context-Aware Applications, Georgia Institute of Technology (2000)","key":"106_CR7"},{"key":"106_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/3-540-45866-2_14","volume-title":"Pervasive Computing","author":"K. Henricksen","year":"2002","unstructured":"Henricksen, K., et al.: Modeling Context Information in Pervasive Computing Systems. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol.\u00a02414, pp. 167\u2013180. Springer, Heidelberg (2002)"},{"key":"106_CR9","volume-title":"Decisions with Multiple Objectives: Preferences and Value Tradeoffs","author":"R.L. Keeney","year":"1976","unstructured":"Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)"},{"key":"106_CR10","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/3-540-44958-2_17","volume-title":"Modeling and Using Context","author":"G.K. Most\u00e9faoui","year":"2003","unstructured":"Most\u00e9faoui, G.K., Br\u00e9zillon, P.: A generic framework for context-based distributed authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS (LNAI), vol.\u00a02680, pp. 204\u2013217. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Long, S., et al.: Rapid prototyping of mobile context-aware applications: The cyberguide case study. In: Proc. the 1996 Conf. Human Factors in Computing Systems (CHI 1996), pp. 293\u2013294 (1996)","key":"106_CR11","DOI":"10.1145\/257089.257328"},{"key":"106_CR12","first-page":"119","volume-title":"Simple Heuristics That Make Us Smart","author":"L. Martignon","year":"1999","unstructured":"Martignon, L., Hoffrage, U.: Why Does One-Reason Decision Making Work? In: Simple Heuristics That Make Us Smart, pp. 119\u2013140. Oxford University Press, New York (1999)"},{"unstructured":"Masone, C.: Role Definition Language (RDL): A Language to Describe Context-Aware Roles, tech. report, TR2001-426, Dept. of Computer Science, Dartmouth College (May 2002)","key":"106_CR13"},{"unstructured":"Osbakk, P., Ryan, N.: Context Privacy, CC\/PP, and P3P. In: Proc. UBICOMP 2002 - Workshop on Security in Ubiquitous Computing, pp. 9\u201310 (2002)","key":"106_CR14"},{"unstructured":"Rakotonirainy, A.: Context-oriented programming for pervasive systems, tech. report, University of Queensland (September 2002)","key":"106_CR15"},{"unstructured":"The SART Project, http:\/\/www-poleia.lip6.fr\/~brezil\/SART\/index.html","key":"106_CR16"},{"issue":"6","key":"106_CR17","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/S0097-8493(99)00120-X","volume":"23","author":"A. Schmidt","year":"1999","unstructured":"Schmidt, A., et al.: There is more to context than location. Computers and Graphics\u00a023(6), 893\u2013902 (1999)","journal-title":"Computers and Graphics"},{"unstructured":"Sch\u00e4fer, R.: Rules for Using Multi-Attribute Utility Theory for Estimating a User\u2019s Interests. In: Proc. 9th GI-Workshop. ABIS-Adaptivit\u00e4t und Benutzermodellierung in interaktiven softwaresystemen, Dortmund, Germany (2001)","key":"106_CR18"},{"unstructured":"Shankar, N., Balfanz, D.: Enabling Secure Ad-hoc Communication Using Context-Aware Security Services (Extended Abstract). In: Proc. UBICOMP 2002 -Workshop on Security in Ubiquitous Computing (2002)","key":"106_CR19"},{"key":"106_CR20","volume-title":"Chapter in RADIUS: Image Understanding for Intelligence Imagery","author":"T.M. Strat","year":"1997","unstructured":"Strat, T.M., et al.: Context-Based Vision. In: Firschein, O., Strat, T.M. (eds.) Chapter in RADIUS: Image Understanding for Intelligence Imagery, Morgan Kaufmann, San Francisco (1997)"},{"key":"106_CR21","volume-title":"Decision Analysis and Behavioral Research","author":"D. Winterfeld von","year":"1986","unstructured":"von Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge (1986)"},{"issue":"3","key":"106_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st Century. Scientific American\u00a0265(3), 66\u201375 (1991)","journal-title":"Scientific American"},{"issue":"3","key":"106_CR23","first-page":"33","volume":"1","author":"S.S. Yau","year":"2002","unstructured":"Yau, S.S., et al.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing, joint special issue with IEEE Personal Communications\u00a01(3), 33\u201340 (2002)","journal-title":"IEEE Pervasive Computing, joint special issue with IEEE Personal Communications"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_106.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:55:41Z","timestamp":1605761741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_106","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}