{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T04:43:21Z","timestamp":1761108201092},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642010033"},{"type":"electronic","value":"9783642010040"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01004-0_10","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T11:03:02Z","timestamp":1238065382000},"page":"177-199","source":"Crossref","is-referenced-by-count":28,"title":["Role Based Access Control with Spatiotemporal Context for Mobile Applications"],"prefix":"10.1007","author":[{"given":"Subhendu","family":"Aich","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Majumdar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G. Ahn","year":"2000","unstructured":"Ahn, G., Sandhu, R.: Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security\u00a03(4), 207\u2013226 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1007\/978-3-540-76843-2_32","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"S. Aich","year":"2007","unstructured":"Aich, S., Sural, S., Majumdar, A.K.: STARBAC: Spatiotemporal Role Based Access Control. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1567\u20131582. Springer, Heidelberg (2007)"},{"issue":"1\/2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1504\/IJICS.2007.012247","volume":"1","author":"V. Atluri","year":"2007","unstructured":"Atluri, V., Chun, S.A.: A Geotemporal Role-based Authorisation System. International Journal of Information and Computer Security\u00a01(1\/2), 143\u2013168 (2007)","journal-title":"International Journal of Information and Computer Security"},{"issue":"3","key":"10_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Transactions on Database Systems\u00a023(3), 231\u2013285 (1998)","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security\u00a04(3), 191\u2013223 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Covington, M.V., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing Context-aware Applications using Environment Roles. In: Proceedings of ACM Symposium on Access Control Models and Technologies, pp. 10\u201320 (2001)","DOI":"10.1145\/373256.373258"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: A Spatially Aware RBAC. ACM Transactions on Information and System Security\u00a010(1) Article 2, (February 2007)","DOI":"10.1145\/1210263.1210265"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Hansen, F., Oleshchuk, V.: Spatial Role-Based Access Control Model for Wireless Networks. In: Proceedings of IEEE Vehicular Technology Conference, pp. 2093\u20132097 (2003)","DOI":"10.1109\/VETECF.2003.1285394"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J.B.D. Joshi","year":"2005","unstructured":"Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role based Access Control Model. IEEE Transactions on Knowledge and Data Engineering\u00a017(1), 4\u201323 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10_CR11","unstructured":"Maji, A.K.: Vulnerability Analysis of a Multi-tier Architecture for Web-based Services with Application to Tele-healthcare, MS Thesis, IIT Kharagpur, India (2008)"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1136\/bmj.328.7449.1162","volume":"328","author":"A.S. McAlearney","year":"2004","unstructured":"McAlearney, A.S., Schweikhart, S.B., Medow, M.A.: Doctors\u2019 Experience with Handheld Computers in Clinical Practice: Qualitative Study. British Medical Journal\u00a0328, 1\u20135 (2004)","journal-title":"British Medical Journal"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Ray, I., Kumar, M., Yu, L.: LRBAC: A Location-Aware Role-Based Access Control Model. In: Proceedings of International Conference on Information Systems Security, pp. 147\u2013161 (2006)","DOI":"10.1007\/11961635_10"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Ray, I., Toahchoodee, M.: A Spatio-Temporal Role-Based Access Control Model. In: Proceedings of 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2007)","DOI":"10.1007\/978-3-540-73538-0_16"},{"key":"10_CR15","unstructured":"Samuel, A., Ghafoor, A., Bertino, E.: A Framework for Specification and Verification of Generalized Spatio-Temporal Role based Access Control Model, CERIAS Tech Report 2007-08, Purdue University, West Lafayette, IN 47907-2086."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role Activation Hierarchies. In: Proceedings of ACM Workshop on Role-Based Access, pp. 33\u201340 (1998)","DOI":"10.1145\/286884.286891"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1377\/hlthaff.25.w555","volume":"25","author":"C. Schoen","year":"2006","unstructured":"Schoen, C., Osborn, R., Huynh, P.T., Doty, M., Peugh, J., Zapert, K.: On the Front Lines of Care: Primary Care Doctors\u2019 Office Systems, Experiences, and Views in Seven Countries. Health Affairs\u00a025(3), 555\u2013571 (2006)","journal-title":"Health Affairs"},{"key":"10_CR19","unstructured":"XML - \n                  \n                    http:\/\/www.w3c.org\/XML\/"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01004-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T02:21:17Z","timestamp":1551925277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01004-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642010033","9783642010040"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01004-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}