{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:06:52Z","timestamp":1725563212631},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642148903"},{"type":"electronic","value":"9783642148910"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14891-0_8","type":"book-chapter","created":{"date-parts":[[2010,8,25]],"date-time":"2010-08-25T05:49:58Z","timestamp":1282715398000},"page":"84-91","source":"Crossref","is-referenced-by-count":0,"title":["Access Control in Personal Localized Semantic Information Spaces"],"prefix":"10.1007","author":[{"given":"Alexey","family":"Koren","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Buntakov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MIS.2006.62","volume":"21","author":"N. Shadbolt","year":"2006","unstructured":"Shadbolt, N., Berners-Lee, T., Hall, W.: The Semantic Web Revisited. IEEE Intelligent Systems\u00a021(3), 96\u2013101 (2006)","journal-title":"IEEE Intelligent Systems"},{"key":"8_CR2","unstructured":"Oliver, I., Honkola, J., Ziegler, J.: Dynamic, Localised Space Based Semantic Webs. In: WWW\/Internet Conference, Freiburg, Germany (2008)"},{"key":"8_CR3","unstructured":"Oliver, I., Honkola, J.: Personal Semantic Web Through A Space Based Computing Environment. In: Middleware for Semantic Web 08 at ICSC\u201908, Santa Clara, CA, USA (2008)"},{"key":"8_CR4","unstructured":"Koren, A., Balandin, S.: The Road to Smart Spaces: Convergence of Consumer Electronics with a Change of Content Management and Application Design Principles. In: Proceedings of 6th FRUCT Seminar, Helsinki, Finland (2009)"},{"key":"8_CR5","unstructured":"Resource Description Framework (RDF): Concepts and Abstract Syntax. In: W3C Recommendation, http:\/\/www.w3.org\/TR\/rdf-concepts\/ (retrieved 03-08-2009)"},{"key":"8_CR6","unstructured":"OWL Web Ontology Language Overview, W3C Recommendation, http:\/\/www.w3.org\/TR\/owl-features\/ (retrieved 03-08-2009)"},{"key":"8_CR7","volume-title":"Proc. of the Second IEEE Symposium on Multi-Agent Security and Survivability","author":"R. Montanari","year":"2005","unstructured":"Montanari, R., Toninelli, A., Bradshaw, J.M.: Context-Based Security Management for Multi-Agent Systems. To be published Proc. of the Second IEEE Symposium on Multi-Agent Security and Survivability. IEEE Press, Philadelphia (2005)"},{"key":"8_CR8","unstructured":"Toninelli, A., Kagal, L., Bradshaw, J.M., Montanari, R.: Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments. In: Proc. of the Semantic Web and Policy Workshop (SWPW), in conj. with ISWC 2005, Galway, Ireland (2005)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proceedings of 1st IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2003), Fort Worth, TX, pp. 489\u2013496 (2003)","DOI":"10.1109\/PERCOM.2003.1192774"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT\u201901, May 3-4, Chantilly, Virginia, USA (2001)","DOI":"10.1145\/373256.373258"},{"key":"8_CR11","unstructured":"Dietzold, S., Auer, S.: Access Control on RDF Triple Stores from a Semantik Wiki Perspective"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Jain, A., Farkas, C.: Secure Resource Description Framework: an Access Control Model. In: SACMAT\u201906, Lake Tahoe, California, USA (2006)","DOI":"10.1145\/1133058.1133076"},{"key":"8_CR13","unstructured":"FOAF Vocabulary Specification, http:\/\/xmlns.com\/foaf\/spec\/ (retrieved, 10-04-2010)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R., et al.: Role based access control models. IEEE Computer\u00a029(2) (February 1996)","DOI":"10.1109\/2.485845"},{"key":"8_CR15","unstructured":"Finnish-Russian University Collaboration in Telecommunications (FRUCT) program official webpage, http:\/\/www.fruct.org (retrieved, 10-04-2010)"}],"container-title":["Lecture Notes in Computer Science","Smart Spaces and Next Generation Wired\/Wireless Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14891-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T04:04:17Z","timestamp":1559448257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14891-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642148903","9783642148910"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14891-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}