{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:20:01Z","timestamp":1737436801548,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540742548"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74255-5_29","type":"book-chapter","created":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T08:19:00Z","timestamp":1188202740000},"page":"384-396","source":"Crossref","is-referenced-by-count":3,"title":["Context-Aware Security Management System for Pervasive Computing Environment"],"prefix":"10.1007","author":[{"given":"Seon-Ho","family":"Park","sequence":"first","affiliation":[]},{"given":"Young-Ju","family":"Han","sequence":"additional","affiliation":[]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/11847366_59","volume-title":"High Performance Computing and Communications","author":"S.-H. Park","year":"2006","unstructured":"Park, S.-H., Han, Y.-J.: Context-Role Based Access Control for Context-Aware Application. In: Gerndt, M., Kranzlm\u00fcller, D. (eds.) HPCC 2006. LNCS, vol.\u00a04208, pp. 572\u2013580. Springer, Heidelberg (2006)"},{"key":"29_CR2","unstructured":"Korkea-aho, M.: Context-Aware Application Survey, Internetworking Seminar (Tik-110.551), Helsinki University of Technology (April 2000)"},{"key":"29_CR3","first-page":"85","volume-title":"WMCSA 1994","author":"B. Schilit","year":"1994","unstructured":"Schilit, B., Adams, N., et al.: Context-aware computing applications. In: WMCSA 1994, Santa Cruz, California, pp. 85\u201390. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"29_CR4","unstructured":"Zhang, G., Parashar, M.: Context-aware Dynamic Access Control for Pervasive Applications. In: 2004 Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS\u201904), San Diego, California (January 2004)"},{"key":"29_CR5","unstructured":"Convington, M.J., Long, W., et al.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, Chantilly, Virginia (May 3-4, 2001)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Moran, T.P., Dourish, P.: Introduction to This Special Issue on Context-Aware Computing. Hunam Computer Interaction 16 (2001)","DOI":"10.1207\/S15327051HCI16234_01"},{"issue":"2","key":"29_CR7","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., et al.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., et al.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security\u00a04(3) (August 2001)","DOI":"10.1145\/501978.501980"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Al-Muhtadi, J., Ranganathan, A., et al.: Cerberus: A Context-Aware SEcurity Scheme for Smart Spaces. In: IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), Dallas-Fort Worth, Texas (March 23-26, 2003)","DOI":"10.1109\/PERCOM.2003.1192774"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Convington, M.J., Fogla, P., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the 18th Annual Computer Security Applications Conference, p. 249 (2002)","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"29_CR11","unstructured":"Cerqueira, R., Hess, C.K., et al.: Gaia: A Development Infrastructure for Active Spaces. In: Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP (2001)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Moyer, M.J., Ahamad, M.: Generalized role based access control. In: Proceedings of the 2001 International Conference on Distributed Computing Systems (ICDCS), Mesa (April 2001)","DOI":"10.1109\/ICDSC.2001.918969"}],"container-title":["Lecture Notes in Computer Science","Modeling and Using Context"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74255-5_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T17:26:21Z","timestamp":1737393981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74255-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540742548"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74255-5_29","relation":{},"subject":[]}}