{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:12:28Z","timestamp":1725570748785},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642174988"},{"type":"electronic","value":"9783642174995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17499-5_1","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T08:12:47Z","timestamp":1291709567000},"page":"1-24","source":"Crossref","is-referenced-by-count":1,"title":["A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application"],"prefix":"10.1007","author":[{"given":"Luca","family":"Compagna","sequence":"first","affiliation":[]},{"given":"Paul","family":"El Khoury","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Ayda","family":"Saidane","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"ActiveBPEL, LLC, ActiveBPEL, the Open Source BPEL Engine, No longer supported by the company as Open Source since 2010, http:\/\/www.activebpel.org"},{"key":"1_CR2","unstructured":"Prediction-based strategies for energy saving in object tracking sensor networks (2004)"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/952532.952602","volume-title":"Proc. of the 2003 ACM Symp. on Applied Comp.","author":"J. Abendroth","year":"2003","unstructured":"Abendroth, J., Jensen, C.D.: A unified security framework for networked applications. In: Proc. of the 2003 ACM Symp. on Applied Comp., pp. 351\u2013357. ACM Press, New York (2003)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Acampora, G., Gaeta, M., Loia, V., Vasilakos, A.V.: Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Trans. Auton. Adapt. Syst. (2010)","DOI":"10.1145\/1740600.1740604"},{"issue":"3","key":"1_CR5","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3233\/JCS-2003-11306","volume":"11","author":"C. Altenschmidt","year":"2003","unstructured":"Altenschmidt, C., Biskup, J., Flegel, U., Karabulut, Y.: Secure mediation: Requirements, design, and architecture. JCS\u00a011(3), 365\u2013398 (2003)","journal-title":"JCS"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1145\/352600.352635","volume-title":"Proc. of CCS 2000","author":"R. Au","year":"2000","unstructured":"Au, R., Looi, M., Ashley, P.: Cross-domain one-shot authorization using smart cards. In: Proc. of CCS 2000, pp. 220\u2013227. ACM Press, New York (2000)"},{"issue":"3-4","key":"1_CR7","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/BF03219911","volume":"61","author":"T. Aura","year":"2006","unstructured":"Aura, T., Roe, M.: Designing the mobile ipv6 security protocol. Annales des T\u00e9l\u00e9communications\u00a061(3-4), 332\u2013356 (2006)","journal-title":"Annales des T\u00e9l\u00e9communications"},{"key":"1_CR8","first-page":"310","volume-title":"Proc. of ACSAC 1999","author":"K. Beznosov","year":"1999","unstructured":"Beznosov, K., Deng, Y., Blakley, B., Burt, C., Barkley, J.: A resource access decision service for CORBA-based distributed systems. In: Proc. of ACSAC 1999, pp. 310\u2013319. IEEE Press, Los Alamitos (1999)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A.: Rule languages for security and privacy in cooperative systems. COMPSAC\u00a0(1), 268\u2013269 (2005)","DOI":"10.1109\/COMPSAC.2005.133"},{"key":"1_CR10","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1145\/581339.581370","volume-title":"ICSE","author":"S.A. Butler","year":"2002","unstructured":"Butler, S.A.: Security attribute evaluation method: a cost-benefit approach. In: ICSE, pp. 232\u2013240. ACM, New York (2002)"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/507711.507732","volume-title":"Proc. of SACMAT 2002","author":"D.W. Chadwick","year":"2002","unstructured":"Chadwick, D.W., Otenko, A.: The permis x.509 role based privilege management infrastructure. In: Proc. of SACMAT 2002, pp. 135\u2013140. ACM Press, New York (2002)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/1276318.1276346","volume-title":"ICAIL 2007: Proceedings of the 11th International Conference on Artificial Intelligence and Law","author":"L. Compagna","year":"2007","unstructured":"Compagna, L., Khoury, P.E., Massacci, F., Thomas, R., Zannone, N.: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In: ICAIL 2007: Proceedings of the 11th International Conference on Artificial Intelligence and Law, pp. 149\u2013153. ACM Press, New York (2007)"},{"key":"1_CR13","first-page":"211","volume-title":"Policy-driven negotiation for authorization in the grid","author":"I. Constandache","year":"2007","unstructured":"Constandache, I., Olmedilla, D., Siebenlist, F.: Policy-driven negotiation for authorization in the grid, pp. 211\u2013220. IEEE Press, Los Alamitos (2007)"},{"key":"1_CR14","volume-title":"IEEE International Policies for Distributed Systems and Networks (POLICY 2007)","author":"I. Constandache","year":"2007","unstructured":"Constandache, I., Olmedilla, D., Siebenlist, F.: Policy-driven negotiation for authorization in the grid. In: IEEE International Policies for Distributed Systems and Networks (POLICY 2007). IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Covingtony, M.J., Fogla, P., Mustaque Ahamad, Z.Z.: A context-aware security architecture for emerging applications. In: ACSAC 2002 (2002)","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"1_CR16","volume-title":"Supplement of the 2002 Int. Conf. on Dependable Systems and Networks","author":"M. Cukier","year":"2002","unstructured":"Cukier, M., Courtney, T., Lyons, J., Ramasamy, H.V., Sanders, W.H., Seri, M., Atighetchi, M., Rubel, P., Jones, C., Webber, F., Watro, P.P.R., Gossett, J.: Providing intrusion tolerance with itua. In: Supplement of the 2002 Int. Conf. on Dependable Systems and Networks. IEEE Press, Los Alamitos (2002)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory, IETF RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"1_CR18","unstructured":"Fernandez, E.: Metadata and authorization patterns. Technical report, Florida Atlantic University (2000)"},{"key":"1_CR19","unstructured":"Fernandez, E., Pan, R.: A pattern language for security models. In: Proc. of the 8th Conf. on Pattern Languages of Programs (2001)"},{"key":"1_CR20","volume-title":"Proc. of the ACM International Conference of Security and Cryptography","author":"L. Gomez","year":"2007","unstructured":"Gomez, L., Thomas, I.: Towards user authentication flexibility. In: Proc. of the ACM International Conference of Security and Cryptography. ACM Press, New York (2007)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-45559-0_6","volume-title":"Middleware 2000","author":"J.A. Hine","year":"2000","unstructured":"Hine, J.A., Yao, W., Bacon, J., Moody, K.: An architecture for distributed OASIS services. In: Coulson, G., Sventek, J. (eds.) Middleware 2000. LNCS, vol.\u00a01795, pp. 104\u2013120. Springer, Heidelberg (2000)"},{"key":"1_CR22","first-page":"340","volume-title":"Proc. of the 7th IEEE Int. Work. on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 1998)","author":"W. Johnston","year":"1998","unstructured":"Johnston, W., Mudumbai, S., Thompson, M.: Authorization and attribute certificates for widely distributed access control. In: Proc. of the 7th IEEE Int. Work. on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 1998), pp. 340\u2013345. IEEE Press, Los Alamitos (1998)"},{"key":"1_CR23","unstructured":"Knight, C., Heimbigner, D., Wolf, A.L., Carzaniga, A., Hill, J.C., Devanbu, P., Gertz, M.: The willow survivability architecture. In: Proc. of the 4th Information Survivability Workshop (2001)"},{"key":"1_CR24","volume-title":"Proceedings of the Requirements for High Assurance Systems Workshop (RHAS 2003)","author":"S. Konrad","year":"2003","unstructured":"Konrad, S., Cheng, B.H.C., Campbell, L.A., Wassermann, R.: Using security patterns to model and analyze security requirements. In: Proceedings of the Requirements for High Assurance Systems Workshop (RHAS 2003), Monterey Bay CA, USA. IEEE Computer Society, Los Alamitos (September 2003)"},{"key":"1_CR25","volume-title":"SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy","author":"D. Ma","year":"2007","unstructured":"Ma, D., Tsudik, G.: Extended abstract: Forward-secure sequential aggregate authentication. In: SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"4","key":"1_CR26","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.websem.2004.06.002","volume":"1","author":"D.L. McGuinness","year":"2004","unstructured":"McGuinness, D.L., da Silva, P.P.: Explaining answers from the semantic web: The inference web approach. Journal of Web Semantics\u00a01(4), 397\u2013413 (2004)","journal-title":"Journal of Web Semantics"},{"key":"1_CR27","first-page":"1","volume-title":"Advances in Object-Oriented Software Engineering","author":"B. Meyer","year":"1991","unstructured":"Meyer, B.: Design by contract. In: Mandrioli, D., Meyer, B. (eds.) Advances in Object-Oriented Software Engineering, pp. 1\u201350. Prentice-Hall, Englewood Cliffs (1991)"},{"issue":"10","key":"1_CR28","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201ddesign by contract\u201d. Computer\u00a025(10), 40\u201351 (1992)","journal-title":"Computer"},{"key":"1_CR29","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/ICSE.2003.1201252","volume-title":"ICSE 2003: Proceedings of the 25th International Conference on Software Engineering","author":"B. Meyer","year":"2003","unstructured":"Meyer, B.: The grand challenge of trusted components. In: ICSE 2003: Proceedings of the 25th International Conference on Software Engineering, Washington, DC, USA, pp. 660\u2013667. IEEE Computer Society, Los Alamitos (2003)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Moloney, M., Weber, S.: A context-aware trust-based security system for ad hoc networks. In: Proc. of the Security and Privacy for Emerging Areas in Communication Networks Workshop, pp. 153\u2013160. IEEP (2005)","DOI":"10.1109\/SECCMW.2005.1588309"},{"key":"1_CR31","unstructured":"Moses, T.: extensible access control markup language tc v2.0 (xacml) (February 2005)"},{"key":"1_CR32","unstructured":"Piero, J.P., Bonatti, A., Olmedilla, D.: Advanced policy explanations on the web. In: ECAI 2006, pp. 200\u2013204 (2006)"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Pigot, H., Mayers, A., Giroux, S.: The intelligent habitat and everyday life activity support. In: Proc. of the 5th Int. Conf. on Simulations in Biomedicine, pp. 507\u2013516 (2003)","DOI":"10.2495\/BIO030501"},{"key":"1_CR34","volume-title":"Proc. of the Ambient Intelligence Developments Conf. (AmI.d 2007)","author":"F. Sanchez-Cid","year":"2007","unstructured":"Sanchez-Cid, F., Munoz, A., Khoury, P.E., Compagna, L.: Xacml as a security and dependability pattern for access control in ami environments. In: Proc. of the Ambient Intelligence Developments Conf. (AmI.d 2007). Springer, Heidelberg (2007)"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: A survey. In: International Conference on Parallel and Distributed Computing Applications and Technologies, pp. 315\u2013320 (2006)","DOI":"10.1109\/PDCAT.2006.96"},{"key":"1_CR36","volume-title":"Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001)","author":"M. Schumacher","year":"2001","unstructured":"Schumacher, M., Roedig, U.: Security Engineering with Patterns. In: Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001). ACM Press, New York (2001)"},{"key":"1_CR37","series-title":"Advances in Information Security","volume-title":"Security and Dependability for Ambient Intelligence","year":"2009","unstructured":"Spanoudakis, G., Gomez, A.M., Kokolakis, S. (eds.): Security and Dependability for Ambient Intelligence. Advances in Information Security, vol.\u00a045. Springer, Heidelberg (2009) ISBN: 978-0-387-88774-6"},{"key":"1_CR38","unstructured":"Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based access control for widely distributed resources. In: Proc. of 8th USENIX Security Symposium, pp. 215\u2013228 (August 1999)"},{"key":"1_CR39","unstructured":"Wassermann, R., Cheng, B.: Security patterns. Technical Report MSU-CSE-03-23, Comp. Sci. and Eng., Michigan State Univ. (2003)"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Wimmel, G., Wisspeintner, A.: Extended description techniques for security engineering. In: Proc. of the 16th Int. Conf. on Information Security (2001)","DOI":"10.1007\/0-306-46998-7_32"},{"key":"1_CR41","first-page":"529","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"T. Woo","year":"1992","unstructured":"Woo, T., Lam, S.: Authorization in distributed systems: a formal approach. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 529\u2013536. IEEE Press, Los Alamitos (1992)"},{"key":"1_CR42","volume-title":"Conference on Pattern Languages of Programs (PLoP 1997)","author":"J. Yoder","year":"1997","unstructured":"Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. In: Conference on Pattern Languages of Programs (PLoP 1997). ACM, New York (1997)"},{"key":"1_CR43","first-page":"57","volume-title":"Proc. of Symp. on Sec. and Privacy","author":"M. Zurko","year":"1999","unstructured":"Zurko, M., Simon, R., Sanfilippo, T.: A user-centered, modular authorization service built on an RBAC foundation. In: Proc. of Symp. on Sec. and Privacy, pp. 57\u201371. IEEE Press, Los Alamitos (1999)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science X"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17499-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:47:32Z","timestamp":1559843252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17499-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174988","9783642174995"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17499-5_1","relation":{},"ISSN":["0302-9743","1866-4741"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1866-4741"}],"subject":[],"published":{"date-parts":[[2010]]}}}