{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:09:30Z","timestamp":1725599370222},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642228742"},{"type":"electronic","value":"9783642228759"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22875-9_6","type":"book-chapter","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T03:29:18Z","timestamp":1312428558000},"page":"63-74","source":"Crossref","is-referenced-by-count":13,"title":["Access Control at Triple Level: Specification and Enforcement of a Simple RDF Model to Support Concurrent Applications in Smart Environments"],"prefix":"10.1007","author":[{"given":"Alfredo","family":"D\u2019Elia","sequence":"first","affiliation":[]},{"given":"Jukka","family":"Honkola","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Manzaroli","sequence":"additional","affiliation":[]},{"given":"Tullio Salmon","family":"Cinotti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Lee, T.B., Hendler, J., Lassila, O.: The semantic web. Scientific American (2001)"},{"key":"6_CR2","unstructured":"Context Broker Architecture, http:\/\/cobra.umbc.edu\/"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00779-005-0045-4","volume":"10","author":"D. Smith","year":"2006","unstructured":"Smith, D., Ma, L., Ryan, N.: Acoustic environment as an indicator of social and physical context. Personal and Ubiquitous Computing\u00a010, 241\u2013254 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"key":"6_CR4","volume-title":"Takao UNO, Reading Historical Spatial Information From Around the World: Studies of Culture and Civilization Based on Geographic Information Systems Data","author":"N. Ryan","year":"2005","unstructured":"Ryan, N.: Smart environments for cultural heritage. In: Takao, U.N.O. (ed.) Takao UNO, Reading Historical Spatial Information From Around the World: Studies of Culture and Civilization Based on Geographic Information Systems Data, International Research Center for Japanese Studies, Kyoto (2005)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Luukkala, V., Binnema, D., B\u00f6rzsei, M., Corongiu, A., Hyttinen, P.: Experiences in Implementing a Cross-Domain Use Case by Combining Semantic and Service Level Platforms. In: Proceedings of 1st Workshop on Semantic Interoperability in Smart Spaces (2010)","DOI":"10.1109\/ISCC.2010.5546640"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Savolainen, P., Niemel\u00e4, E., Savola, R.: A Taxonomy of Information Security for Service-Centric Systems. In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 5\u201312 (2007)","DOI":"10.1109\/EUROMICRO.2007.12"},{"key":"6_CR7","first-page":"437","volume-title":"Proc. Princeton Symposium on Information Sciences and Systems","author":"B.W. Lampson","year":"1971","unstructured":"Lampson, B.W.: Protection. In: Proc. Princeton Symposium on Information Sciences and Systems, pp. 437\u2013443. Princeton University, Princeton (1971); reprinted in: Operating Systems Review 8(1), 18\u201324 (1974)"},{"key":"6_CR8","unstructured":"Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Founda-tions and Model. National Technical Information Service (Spring 1973)"},{"issue":"11","key":"6_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R. Sandhu","year":"1993","unstructured":"Sandhu, R.: Lattice-based access control models. IEEE Computer\u00a026(11), 9\u201319 (1993)","journal-title":"IEEE Computer"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Dijkstra, E.W.: Solution of a problem in concurrent programming control. Communications of the ACM\u00a08(9) (1965)","DOI":"10.1145\/365559.365617"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Dijkstra, E.W.: Co-operating sequential processes. In: Genuys, F. (ed.) Programming Languages, pp. 43\u2013112 (1968)","DOI":"10.1007\/978-1-4757-3472-0_2"},{"key":"6_CR12","unstructured":"Dietzold, S., Auer, S.: Access control on RDF triple stores from a semantic wiki perspective. In: Scripting for the Semantic Web Workshop at 3rd European Semantic Web Conference, ESWC (2006)"},{"key":"6_CR13","unstructured":"Manjunath, G., Sayers, C., Reynolds, D., Venugopal, K.S., Mohalik, S.K., Badrinath, R., Recker, J.L., Mesarina, M.: Semantic Views for Controlled Access to the Semantic Web. In: HP Technical Reports, Laboratories HPL (2008)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Suomalainen, J., Hyttinen, P., Tarvainen, P.: Secure information sharing between heterogeneous embedded devices. In: Proceedings of the Fourth European Conference on Software Architecture: Companion, ECSA (2010)","DOI":"10.1145\/1842752.1842793"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Montanari, R., Toninelli, A., Bradshaw, J.M.: Context-based security management for multi-agent systems. In: Proc. of the 2nd IEEE Sym. on Multi-Agent Security and Survivability (MAS&S 2005), pp. 75\u201384 (2005)","DOI":"10.1109\/MASSUR.2005.1507050"},{"key":"6_CR16","unstructured":"Toninelli, A., Kagal, L., Bradshaw, J.M., Montanari, R.: Rule-based and ontology-based policies: toward a hybrid approach to control agents in pervasive environments. In: Proc. of the Semantic Web and Policy Workshop (SWPW), in Conj. with ISWC 2005, Galway, Ireland (2005)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Jain, A., Farkas, C.: Secure resource description framework: An access control model. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT 2006), pp. 121\u2013129 (2006)","DOI":"10.1145\/1133058.1133076"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-04190-7_3","volume-title":"Smart Spaces and Next Generation Wired\/Wireless Networking","author":"J. Honkola","year":"2009","unstructured":"Honkola, J., Laine, H., Brown, R., Oliver, I.: Cross-Domain Interoperability: A Case Study. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) NEW2AN\/ruSMART 2009. LNCS, vol.\u00a05764, pp. 22\u201331. Springer, Heidelberg (2009)"},{"key":"6_CR19","unstructured":"SOFIA project \u2013 Smart Objects for Intelligent Applications, http:\/\/www.sofia-project.eu"},{"key":"6_CR20","unstructured":"RDF Semantics, http:\/\/www.w3.org\/TR\/rdf-mt\/"},{"key":"6_CR21","unstructured":"Smart-M3 Open Source Project, http:\/\/sourceforge.net\/projects\/smart-m3"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Honkola, J., Laine, H., Brown, R., Tyrkk\u00f6, O.: Smart-M3 Information Sharing Platform. In: Proceedings of 1st Workshop on Semantic Interoperability in Smart Spaces (2010)","DOI":"10.1109\/ISCC.2010.5546642"},{"key":"6_CR23","unstructured":"Reddivari, P., Finin, T., Joshi, A.: Policy based Access Control for a RDF Store. In: Proceedings of the Policy Management for the Web Workshop, A WWW 2005 Workshop, W3C, pp. 78\u201383 (May 2005)"},{"key":"6_CR24","unstructured":"Lassila, O.: Programming Semantic Web Applications: A Synthesis of Knowledge Representation and Semi-Structured Data. Doctoral dissertation (October 2007) ISBN 978-951-22-8985-1"}],"container-title":["Lecture Notes in Computer Science","Smart Spaces and Next Generation Wired\/Wireless Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22875-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T19:17:19Z","timestamp":1560453439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22875-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642228742","9783642228759"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22875-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}