{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:00:10Z","timestamp":1725487210605},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540730347"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73035-4_10","type":"book-chapter","created":{"date-parts":[[2007,6,29]],"date-time":"2007-06-29T17:08:08Z","timestamp":1183136888000},"page":"90-98","source":"Crossref","is-referenced-by-count":1,"title":["An Authentication Architecture Dedicated to Dependent People in Smart Environments"],"prefix":"10.1007","author":[{"given":"Mhamed","family":"Abdallah","sequence":"first","affiliation":[]},{"given":"Cecilia","family":"Fred","sequence":"additional","affiliation":[]},{"given":"Arab","family":"Farah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Coen, M.: Design principles for intelligent environments. In: Proceedings of the fifteenth National Conference on Artificial Intelligence (AAAAI98), Madison, WI, pp. 547\u2013554 (1998)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy based security protocols in networked mobile device. In: Proceedings of ACM Symposium on Applied Computing (SAC 2002), Madrid, Spain (March 2002)","DOI":"10.1145\/508791.508845"},{"key":"10_CR3","unstructured":"Matthew, M.C.: Generalized role based access control for securing future applications. In: Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD (October 2000)"},{"key":"10_CR4","unstructured":"Gill, B., Viswanathan, P., Campbell, R.: Security architecture in GAIA, Technical report, UIUCDCS-R-2001-2215 UILU-ENG-2001-1720, University of Illinois at Urbana, Champaign, IL, USA (2001)"},{"key":"10_CR5","unstructured":"Al-Muhtadi, J.F.: An Intelligent authentication infrastructure for ubiquitous computing environments, PhD thesis, University of Illinois, Urbana-Champaign, IL, USA (2005)"},{"issue":"5","key":"10_CR6","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/5254.889101","volume":"15","author":"S.R. Hedberg","year":"2000","unstructured":"Hedberg, S.R.: After desktop computing: a progress report on smart environments research. IEEE Intelligent Systems and Their Applications Magazine\u00a015(5), 7\u20139 (September-October 2000)","journal-title":"IEEE Intelligent Systems and Their Applications Magazine"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Mhamed, A., Mokhtari, M.: Providing a new Authentication Tool for Dependant people in Pervasive Environments. In: Proc. of the IEEE International Conference on Information & Communication Technologies (ICTTA04), Damascus, Syria (April 2006)","DOI":"10.1109\/ICTTA.2006.1684480"},{"key":"10_CR8","unstructured":"Specht, M., Burkhardt, J.M., De La GarzaC.: De lactivit des ans confronts aux nouvelles technologies, Retraite et Socit, Technologie et Vieillissement, vol. 26\/2, pp. 21\u201338"},{"issue":"9","key":"10_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Theodore, T.: Kerberos: An authentication Service for Computer Networks. IEEE Communications Magazine\u00a032(9), 33\u201338 (September 1994)","journal-title":"IEEE Communications Magazine"},{"key":"10_CR10","unstructured":"Sirbu, M.A., Chung-I Chuang, J.: Distributed Authentication in Kerberos Using Public Key Cryptography, Internet Society 1997, Symposium on Network and Distributed System Security (February 1997)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Feki, M.A., Mokhtari, M.: Context awareness for pervasive assistive environment, in IDEA publisher (ed.) Ismail Khalil Ibrahim, Handbook of Research on Mobile Multimedia. Idea Group Publisher (May 22, 2006) ISBN: 1-59140","DOI":"10.4018\/978-1-59140-866-6.ch030"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing for Quality of Life Enhancement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73035-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T19:11:25Z","timestamp":1683918685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73035-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540730347"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73035-4_10","relation":{},"subject":[]}}