{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:31:21Z","timestamp":1738387881646,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_33","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T19:53:29Z","timestamp":1221854009000},"page":"401-414","source":"Crossref","is-referenced-by-count":2,"title":["A Context-Aware Mandatory Access Control Model for Multilevel Security Environments"],"prefix":"10.1007","author":[{"given":"Jafar Haadi","family":"Jafarian","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997 Rev. 1. MITRE Corporation (1976)","DOI":"10.21236\/ADA023588"},{"key":"33_CR2","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547. MITRE Corporation (1976)"},{"key":"33_CR3","unstructured":"Biba, K.: Integrity Considerations for Secure Computer Systems. In: Corporation, M. (ed.): Technical Report MTR-3153, Bedford, MA (1977)"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Dion, L.C.: A Complete Protection Model. In: IEEE Symposium on Security and Privacy, Oakland, CA, pp. 49\u201355 (1981)","DOI":"10.1109\/SP.1981.10006"},{"key":"33_CR5","first-page":"215","volume-title":"IEEE Symposium Research in Security and Privacy","author":"D.F.C. Brewer","year":"1989","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall Security Policy. In: IEEE Symposium Research in Security and Privacy, pp. 215\u2013228. IEEE CS Press, Los Alamitos (1989)"},{"issue":"11","key":"33_CR6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R.S. Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-Based Access Control Models. IEEE Computer\u00a026(11), 9\u201319 (1993)","journal-title":"IEEE Computer"},{"issue":"9","key":"33_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access Controls: Principles and Practice. IEEE Communications\u00a032 (9), 40\u201348 (1994)","journal-title":"IEEE Communications"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, A., Karnik, N., Chafle, G.: Context Sensitivity in Role Based Access Control. ACM SIGOPS Operating Systems Review, 53\u201366 (2002)","DOI":"10.1145\/567331.567336"},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/CSAC.2002.1176307","volume-title":"18th Annual Computer Security Applications Conference","author":"M.A. Al-Kahtani","year":"2002","unstructured":"Al-Kahtani, M.A., Sandhu, R.: A Model for Attribute-Based User-Role Assignment. In: 18th Annual Computer Security Applications Conference, pp. 353\u2013364. IEEE Computer Society Press, Las Vegas (2002)"},{"key":"33_CR10","unstructured":"Covington, M., Moyer, M., Ahamad, M.: Generalized role-based access control for securing future applications. In: 23rd National Information Systems Security Conference, Baltimore, MD, USA (2000), http:\/\/csrc.nist.gov\/nissc\/2000\/proceedings\/toc.pdf"},{"key":"33_CR11","unstructured":"Zhang, G., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Communication Networks and Distributed Systems Modeling and Simulation conference, San Diego (2000)"},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/373256.373259","volume-title":"Sixth ACM Symposium on Access Control Models and Technologies","author":"C.K. Georgiadis","year":"2001","unstructured":"Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas, R.K.: Flexible Team-based Access Control Using Contexts. In: Sixth ACM Symposium on Access Control Models and Technologies, pp. 21\u201327. ACM Press, Chantilly (2001)"},{"key":"33_CR13","unstructured":"Hu, J., Weaver, A.C.: A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications. In: First Workshop on Pervasive Privacy Security, Privacy, and Trust, Boston, MA, USA (2004), http:\/\/www.pspt.org\/techprog.html"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2005.06.007","volume":"25","author":"I. Ray","year":"2006","unstructured":"Ray, I., Kumar, M.: Towards a location-based mandatory access control model. Computers & Security\u00a025, 36\u201344 (2006)","journal-title":"Computers & Security"},{"key":"33_CR15","unstructured":"Baldauf, M., Dustdar, S.: A Survey on Context-aware Systems. Technical report TUV-1841-2004-24. Distributed Systems Group, Technical University of Vienna (2004)"},{"issue":"3","key":"33_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MPRV.2003.1228526","volume":"2","author":"P. Korpip\u00e4\u00e4","year":"2003","unstructured":"Korpip\u00e4\u00e4, P., M\u00e4ntyj\u00e4rvi, J., Kela, J., Ker\u00e4nen, H., Malm, E.-J.: Managing Context Information in Mobile Devices. IEEE Pervasive Computing\u00a02 (3), 42\u201351 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Tao Gu, X.H.W., Pung, H.K., Zhang, D.Q.: A Middleware for Building Context-Aware Mobile Services. In: IEEE Vehicular Technology Conference, Milan, Italy, vol.\u00a05, pp. 2656\u20132660 (2004)","DOI":"10.1109\/VETECS.2004.1391402"},{"key":"33_CR18","unstructured":"Fahy, P., Clarke, S.: CASS: Middleware for Mobile, Context-Aware Applications. In: Workshop on Context Awareness at MobiSys., Boston, pp. 304\u2013308 (2004)"},{"key":"33_CR19","unstructured":"Chen, H., Finn, T., Joshi, A.: Using OWL in a Pervasive Computing Broker. In: Workshop on Ontologies in Open Agent Systems, AAMAS 2003, Melbourne, Australia, pp. 9\u201316 (2003)"},{"issue":"2-4","key":"33_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1207\/S15327051HCI16234_02","volume":"16","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K., Salber, D., Abowd, G.D.: A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction (HCI) Journal\u00a016(2-4), 97\u2013166 (2001)","journal-title":"Human-Computer Interaction (HCI) Journal"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:37:07Z","timestamp":1738370227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}