{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:51Z","timestamp":1767340131691,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044335"},{"type":"electronic","value":"9783642044342"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04434-2_12","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:06:27Z","timestamp":1252951587000},"page":"134-147","source":"Crossref","is-referenced-by-count":6,"title":["A Context-Aware Security Framework for Next Generation Mobile Networks"],"prefix":"10.1007","author":[{"given":"Matteo","family":"Bandinelli","sequence":"first","affiliation":[]},{"given":"Federica","family":"Paganelli","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Vannuccini","sequence":"additional","affiliation":[]},{"given":"Dino","family":"Giuli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a context-aware security scheme for smart spaces. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, March 23-26, pp. 489\u2013496 (2003)","DOI":"10.1109\/PERCOM.2003.1192774"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/S0377-2217(01)00116-3","volume":"136","author":"P. Brezillon","year":"2002","unstructured":"Brezillon, P., Pasquier, L., Pomerol, J.C.: Reasoning with contextual graphs. European Journal of Operational Research\u00a0136(2), 290\u2013298 (2002)","journal-title":"European Journal of Operational Research"},{"key":"12_CR3","volume-title":"Enabling New Services by Exploiting Presence and Context Information in IMS","author":"J. Brok","year":"2006","unstructured":"Brok, J., Kumar, B., Meeuwissen, E., Batteram, H.J.: Enabling New Services by Exploiting Presence and Context Information in IMS. Wiley Interscience, Hoboken (2006)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter Base Protocol. Request for Comments 3588 (September 2003), http:\/\/www.ietf.org\/rfc\/rfc3588.txt","DOI":"10.17487\/rfc3588"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA (December 2002)","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Day, M., Sugano, H., Rosenberg, J.: A Model for Presence and Instant Messaging. Request for Comments 2778 (February 2000), http:\/\/www.ietf.org\/rfc\/rfc2778.txt","DOI":"10.17487\/rfc2778"},{"key":"12_CR7","unstructured":"Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness. In: Workshop on The What, Who, Where, When, and How of Context-Awareness, as part of the 2000 Conference on Human Factors in Computing Systems, CHI 2000 (2000)"},{"key":"12_CR8","unstructured":"Durham, D., Boyle, J., Cohen, R., Herzog, S., Rajan, R., Sastry, A.: The COPS Protocol. Request for Comments 2748 (January 2000), http:\/\/www.ietf.org\/rfc\/rfc2748.txt"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Handley, M., Jacobson, V.: SDP: Session Description Protocol. Request for Comments: 2327 (April 1998), http:\/\/www.ietf.org\/rfc\/rfc2327.txt","DOI":"10.17487\/rfc2327"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol. Request For Comment 2543 (March 1999), http:\/\/www.ietf.org\/rfc\/rfc2543.txt","DOI":"10.17487\/rfc2543"},{"key":"12_CR11","unstructured":"International Telecommunication Union. ITU-T X.805 Security architecture for systems providing end-to-end communications SERIES X: Data Networks and Open System Communications \u2013 Security (2003)"},{"key":"12_CR12","unstructured":"Masone, C.: Role definition language (rdl): A language to describe context-aware roles. Technical report, Dartmouth College, Computer Science, Hanover, NH (2002)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Mihovska, A., Prasad, N.R.: Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN). In: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, USA (2007)","DOI":"10.1109\/MOBIQ.2007.4451052"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Mostefaoui, G.K., Brezillon, P.: Modeling context-based security policies with contextual graphs. In: The Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 28\u201332 (2004)","DOI":"10.1109\/PERCOMW.2004.1276900"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Nasser, N., Hasswa, A., Hassanein, H.: Handoffs in Fourth Generation Heterogeneous Networks. IEEE Communications Magazine (October 2006)","DOI":"10.1109\/MCOM.2006.1710420"},{"key":"12_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/0470031840","volume-title":"The IMS \u2013 IP Multimedia Concepts and Services","author":"M. Poikselka","year":"2006","unstructured":"Poikselka, M., Mayer, G., Khartbil, H., Niemi, A.: The IMS \u2013 IP Multimedia Concepts and Services. Wiley, Chichester (2006)"},{"issue":"6","key":"12_CR17","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s00779-003-0251-x","volume":"7","author":"A. Ranganathan","year":"2003","unstructured":"Ranganathan, A., Campbell, R.H.: An Infrastructure for Context-Awareness based on First Order Logic. Personal and Ubiquitous Computing\u00a07(6), 353\u2013364 (2003)","journal-title":"Personal and Ubiquitous Computing"},{"key":"12_CR18","first-page":"2","volume-title":"Communications Surveys & Tutorials","author":"M.L. Roberts","year":"2006","unstructured":"Roberts, M.L., Temple, M.A., Mills, R.F., Raines, R.A.: Evolution of the air interface of cellular communications systems toward 4G realization. In: Communications Surveys & Tutorials, vol.\u00a08(1), pp. 2\u201323. IEEE, Los Alamitos (First Quarter 2006)"},{"key":"12_CR19","unstructured":"World Wide Web Consortium, Composite Capability\/Preference Profiles (CC\/PP): Structure and Vocabularies 1.0 (January 2004)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Wullems, C., Looi, M., Clark, A.: Towards Context-aware Security: An Authorization Architecture for Intranet Environments. In: The Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications, pp. 132\u2013137 (2004)","DOI":"10.1109\/PERCOMW.2004.1276919"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Yee, G., Korba, L.: Context-aware Security Policy Agent for Mobile Internet Services. In: Proc. of the 2005 IFIP International Conference on Intelligence in Communication Systems (2005)","DOI":"10.1007\/0-387-32015-6_23"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04434-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T04:14:00Z","timestamp":1739333640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04434-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044335","9783642044342"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04434-2_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}