{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:59Z","timestamp":1725551219284},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_29","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T06:30:40Z","timestamp":1270621840000},"page":"355-367","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Russello","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Scalavino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"eXtensible Access Control Markup Language (XACML) Specification 2.0 (2005), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tchome.php?wgabbrev=xacml"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Aschenbruck, N., Gerhards-Padilla, E., Gerharz, M., Frank, M., Martini, P.: Modelling mobility in disaster area scenarios. In: Proceeding of the 10th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 4\u201312 (2007)","DOI":"10.1145\/1298126.1298131"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Bettini, C., Jajodia, S., Wang, X., Wijesekera, D.: Obligation Monitoring in Policy Management. In: POLICY 2002: Proceedings of the Third IEEE International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011288"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative Communication in Linda. ACM Trans. Prog. Lang. Syst.\u00a07(1), 80\u2013112 (1985)","journal-title":"ACM Trans. Prog. Lang. Syst."},{"key":"29_CR5","unstructured":"Graubart, R.: On the need for a third form of access control. In: 12th National Computing Security Conference, Baltimore, MD, USA, pp. 296\u2013304 (1989)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Kudo, M., Hada, S.: XML document security based on provisional authorization. In: Proceedings of the ACM Conference on Computer and Communications Security (2000)","DOI":"10.1145\/352600.352613"},{"key":"29_CR7","unstructured":"Lilien, L., Huma Kamal, Z., Bhuse, V., Gupta, A.: Opportunistic Networks: The Concept and Research Challenges in Privacy and Security. In: Proc. of Intl. Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami (March 2006)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Mamei, M., Zambonelli, F., Leonardi, L.: Tuples On The Air: A Middleware for Context-Aware Computing in Dynamic Networks. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCSW 2003), Washington, DC, USA, p. 342 (2003)","DOI":"10.1109\/ICDCSW.2003.1203577"},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur.\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"29_CR10","first-page":"368","volume-title":"Proc. 21st Int\u2019l Conf. on Software Engineering (ICSE\u201999)","author":"G.P. Picco","year":"1999","unstructured":"Picco, G.P., Murphy, A.L., Roman, G.-C.: Lime: Linda Meets Mobility. In: Garlan, D., Kramer, J. (eds.) Proc. 21st Int\u2019l Conf. on Software Engineering (ICSE\u201999), Los Angeles, USA, May 1999, pp. 368\u2013377. ACM Press, New York (1999)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Wood, A.: Solving the Linda Multiple rd Problem. In: Coordination Languages and Models, pp. 357\u2013367 (1996)","DOI":"10.1007\/3-540-61052-9_56"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Russello, G., Dong, C., Dulay, N.: Authorisation and conflict resolution for hierarchical domains. In: POLICY 07: Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, Bologna, Italy, pp. 201\u2013210 (2007)","DOI":"10.1109\/POLICY.2007.8"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Scalavino, E., Russello, G., Ball, R., Gowadia, V., Lupu, E.C.: An Opportunistic Authority Evaluation Scheme for Data Security in Crisis Management Scenarios. To appear in 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS), Beijing, China (April 2010)","DOI":"10.1145\/1755688.1755709"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Sen, R., Hackmann, G., Haitjema, M., Roman, G., Gill, C.: Coordinating Workflow Allocation and Execution in Mobile Environments. In: Proceeding of the 9th Int\u2019l Conf. on Coordination Models and Languages, Paphos, Cyprus, June 2007, pp. 249\u2013267 (2007)","DOI":"10.1007\/978-3-540-72794-1_14"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Thomas, R., Russello, G., Tsang, S.: Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. In: IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, pp. 76\u201383 (2009)","DOI":"10.1109\/POLICY.2009.38"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/764792.764803","volume-title":"XMLSEC: Proc. ACM workshop on XML security","author":"X. Wang","year":"2002","unstructured":"Wang, X., Lao, G., DeMartini, T., Reddy, H., Nguyen, M., Valenzuela, E.: XrML eXtensible rights Markup Language. In: XMLSEC: Proc. ACM workshop on XML security, New York, NY, USA, pp. 71\u201379. ACM, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T04:44:40Z","timestamp":1552452280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}