{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:42:10Z","timestamp":1725896530608},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319082"},{"type":"electronic","value":"9783642319099"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31909-9_22","type":"book-chapter","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T03:23:23Z","timestamp":1348284203000},"page":"389-408","source":"Crossref","is-referenced-by-count":0,"title":["Context-Related Access Control for Mobile Caching"],"prefix":"10.1007","author":[{"given":"Zhi","family":"Xu","sequence":"first","affiliation":[]},{"given":"Kun","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Randy","family":"Moulic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/98.729720","volume":"5","author":"Z. Jiang","year":"1998","unstructured":"Jiang, Z., Kleinrock, L.: Web prefetching in a mobile environment. IEEE Personal Communications\u00a05, 25\u201334 (1998)","journal-title":"IEEE Personal Communications"},{"unstructured":"H\u00f6pfner, H., Wendland, S., Mansour, E.: Data caching on mobile devices - the experimental mymidp caching framework. In: Proc. of the 4th International Conference on Software and Data Technologies (2009)","key":"22_CR2"},{"unstructured":"Apple, \u201cSafari developer library: Storing data on the client\u201d, \n                    \n                      http:\/\/developer.apple.com\/library\/safari\/","key":"22_CR3"},{"unstructured":"Allan, A., Warden, P.: Got an iphone or 3g ipad? apple is recording your moves (2011), \n                    \n                      http:\/\/radar.oreilly.com\/2011\/04\/apple-location-tracking.html","key":"22_CR4"},{"doi-asserted-by":"crossref","unstructured":"Schilit, B.N., Adams, N., Want, R.: Context-aware computing applications. In: Proc. of The Workshop on Mobile Computing Systems and Applications, pp. 85\u201390. IEEE Computer Society (1994)","key":"22_CR5","DOI":"10.1109\/WMCSA.1994.16"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","volume-title":"Handheld and Ubiquitous Computing","author":"G.D. Abowd","year":"1999","unstructured":"Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a Better Understanding of Context and Context-Awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol.\u00a01707, pp. 304\u2013307. Springer, Heidelberg (1999)"},{"issue":"4","key":"22_CR7","first-page":"35","volume":"22","author":"M. Lijding","year":"2007","unstructured":"Lijding, M., Meratnia, N., Benz, H.: Smart signs show you the way. IO Vivat\u00a022(4), 35\u201338 (2007)","journal-title":"IO Vivat"},{"doi-asserted-by":"crossref","unstructured":"Kyriacou, E.C., Pattichis, C., Pattichis, M.: An overview of recent health care support systems for eemergency and mhealth applications. In: Proc. of 31st Annual International Conference of the IEEE EMBS (2009)","key":"22_CR8","DOI":"10.1109\/IEMBS.2009.5333913"},{"unstructured":"Hinze, A., Buchanan, G.: Context-awareness in mobile tourist information systems: Challenges for user interaction. In: Proc. Workshop on Context in Mobile HCI, in Conjunction with Mobile HCI (2005)","key":"22_CR9"},{"unstructured":"Johnson, T., Shasha, D.: 2q: a low overhead high performance buffer management replacement algorithm. In: Proc. of the 20th International Conference on Very Large Databases (1994)","key":"22_CR10"},{"unstructured":"Cao, G.: A scalable low-latency cache invalidation strategy for mobile environments. IEEE Trans. on Knowl. and Data Eng. (2003)","key":"22_CR11"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"D.F. Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur.\u00a02, 34\u201364 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In: Proc. of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, pp. 212\u2013222 (2006)","key":"22_CR13","DOI":"10.1145\/1128817.1128850"},{"doi-asserted-by":"crossref","unstructured":"Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: Proc. of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 32\u201343 (2000)","key":"22_CR14","DOI":"10.1145\/345910.345917"},{"doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of the ACM Workshop on Wireless Security (WiSe 2003), pp. 1\u201310 (2003)","key":"22_CR15","DOI":"10.1145\/941311.941313"},{"unstructured":"N. DoCoMo, IBM, I.\u00a0Corporation: Trusted mobile platform: Hardware architecture description (2004)","key":"22_CR16"},{"doi-asserted-by":"crossref","unstructured":"Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B.M., Jaeger, T.: Measuring integrity on mobile phone systems. In: Proc. of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 155\u2013164 (2008)","key":"22_CR17","DOI":"10.1145\/1377836.1377862"},{"doi-asserted-by":"crossref","unstructured":"Cox, L.P., Chen, P.M.: Pocket hypervisors: Opportunities and challenges. In: Proc. of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, HOTMOBILE 2007, pp. 46\u201350 (2007)","key":"22_CR18","DOI":"10.1109\/HotMobile.2007.20"},{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proc. of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334 (2007)","key":"22_CR19","DOI":"10.1109\/SP.2007.11"},{"unstructured":"Chen, G., Kotz, D.: A survey of context-aware mobile computing research, Hanover, NH, USA, Tech. Rep. (2000)","key":"22_CR20"},{"doi-asserted-by":"crossref","unstructured":"Kim, M., Kotz, D., Kim, S.: Extracting a mobility model from real user traces. In: Proc. of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2006) (2006)","key":"22_CR21","DOI":"10.1109\/INFOCOM.2006.173"},{"doi-asserted-by":"crossref","unstructured":"Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and zipf-like distributions: Evidence and implications. In: Proc. of the Conference on Computer Communications (IEEE Infocom 1999) (1999)","key":"22_CR22","DOI":"10.1109\/INFCOM.1999.749260"},{"unstructured":"Cate, V.: Alex-a global file system. In: Proc. of USENIX File System Workshop 1992, pp. 1\u201312 (1992)","key":"22_CR23"},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-642-18178-8_29","volume-title":"Information Security","author":"M. Conti","year":"2011","unstructured":"Conti, M., Nguyen, V.T.N., Crispo, B.: CRePE: Context-Related Policy Enforcement for Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol.\u00a06531, pp. 331\u2013345. Springer, Heidelberg (2011)"},{"unstructured":"Hansen, F., Oleshchuk, V.: Srbac: A spatial role-based access control model for mobile systems. In: Proc. of 7th Nordic Workshop on Secure IT Systems (2003)","key":"22_CR25"},{"doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-rbac: A spatially aware rbac, vol.\u00a010. ACM (2007)","key":"22_CR26","DOI":"10.1145\/1218836.1218838"},{"doi-asserted-by":"crossref","unstructured":"Yu, S., Ren, K., Lou, W.: Fdac: Toward fine-grained distributed data access control in wireless sensor networks. In: Proc. of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2009), pp. 963\u2013971 (2009)","key":"22_CR27","DOI":"10.1109\/INFCOM.2009.5062007"},{"doi-asserted-by":"crossref","unstructured":"Bobba, R., Fatemieh, O., Khan, F., Gunter, C.A., Khurana, H.: Using attribute-based access control to enable attribute-based messaging. In: Proc. of the 22nd Annual Computer Security Applications Conference, pp. 403\u2013413 (2006)","key":"22_CR28","DOI":"10.1109\/ACSAC.2006.53"},{"doi-asserted-by":"crossref","unstructured":"Bobba, R., Fatemieh, O., Khan, F., Khan, A., Gunter, C.A., Khurana, H., Prabhakaran, M.: Attribute-based messaging: Access control and confidentiality. ACM Transactions on Information and Systems Security, TISSEC (2010)","key":"22_CR29","DOI":"10.1145\/1880022.1880025"},{"doi-asserted-by":"crossref","unstructured":"Weber, S.G.: Securing first response coordination with dynamic attribute-based encryption. In: Proc. of World Congress on Privacy, Security, Trust and the Management of e-Business 2009 (2009)","key":"22_CR30","DOI":"10.1109\/CONGRESS.2009.11"},{"doi-asserted-by":"crossref","unstructured":"Xie, L., Zhang, X., Chaugule, A., Jaeger, T., Zhu, S.: Designing system-level defenses against cellphone malware. In: Proc. of the 28th IEEE International Symposium on Reliable Distributed Systems, pp. 83\u201390 (2009)","key":"22_CR31","DOI":"10.1109\/SRDS.2009.21"},{"doi-asserted-by":"crossref","unstructured":"Zhang, X., Seifert, J.-P., Sandhu, R.: Security enforcement model for distributed usage control. In: Proc. of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Sutc 2008 (2008)","key":"22_CR32","DOI":"10.1109\/SUTC.2008.79"},{"unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In: Proc. of the USENIX Symposium on Operating Systems Design and Implementation, OSDI (2010)","key":"22_CR33"},{"doi-asserted-by":"crossref","unstructured":"Ongtang, M., Butler, K., McDaniel, P.: Porscha: Policy oriented secure content handling in android. In: Proc. of the 26th Annual Computer Security Applications Conference, ACSAC (2010)","key":"22_CR34","DOI":"10.1145\/1920261.1920295"},{"unstructured":"Bethencourt, J., Sahai, A., Waters, B.: The cpabe toolkit in advanced crypto software collection, \n                    \n                      http:\/\/acsc.cs.utexas.edu\/cpabe\/","key":"22_CR35"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31909-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T08:43:55Z","timestamp":1557218635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31909-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319082","9783642319099"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31909-9_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}