{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T18:02:57Z","timestamp":1776189777496,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642353611","type":"print"},{"value":"9783642353628","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_19","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T22:55:47Z","timestamp":1354229747000},"page":"236-250","source":"Crossref","is-referenced-by-count":7,"title":["Physical Access Control Administration Using Building Information Models"],"prefix":"10.1007","author":[{"given":"Nimalaprakasan","family":"Skandhakumar","sequence":"first","affiliation":[]},{"given":"Farzad","family":"Salim","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Reid","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"ASHRAE SSPC 135: BACnet - a data communication protocol for building automation and control networks (2012), http:\/\/www.bacnet.org\/"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MSP.2004.71","volume":"2","author":"D. Balfanz","year":"2004","unstructured":"Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K.: In search of usable security: Five lessons from the field. IEEE Security and Privacy\u00a02(5), 19\u201324 (2004)","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"19_CR3","first-page":"34","volume":"12","author":"J. Baty","year":"2012","unstructured":"Baty, J.: The rise of BIM. Concrete Contractor\u00a012(1), 34\u201337 (2012)","journal-title":"Concrete Contractor"},{"key":"19_CR4","first-page":"899","volume-title":"Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009","author":"L. Bauer","year":"2009","unstructured":"Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., Vaniea, K.: Real life challenges in access-control management. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 899\u2013908. ACM, New York (2009)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Beal, B.: IT security: the product vendor landscape. Network Security 2005(5), 9\u201310 (2005)","DOI":"10.1016\/S1353-4858(05)70235-X"},{"key":"19_CR6","first-page":"100","volume-title":"Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007","author":"D. Botta","year":"2007","unstructured":"Botta, D., Werlinger, R., Gagn\u00e9, A., Beznosov, K., Iverson, L., Fels, S., Fisher, B.: Towards understanding it security professionals and their tools. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 100\u2013111. ACM, New York (2007)"},{"issue":"9","key":"19_CR7","first-page":"835","volume":"35","author":"S. Brostoff","year":"2005","unstructured":"Brostoff, S., Sasse, M.A., Chadwick, D., Cunningham, J., Mbanaso, U., Otenko, S.: \u2018R-What?\u2019 Development of a role-based access control policy-writing tool for e-Scientists: Research Articles. Software: Practice and Experience\u00a035(9), 835\u2013856 (2005)","journal-title":"Software: Practice and Experience"},{"issue":"8","key":"19_CR8","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1016\/j.autcon.2009.07.002","volume":"18","author":"C. Eastman","year":"2009","unstructured":"Eastman, C., Min Lee, J., Suk Jeong, Y., Kook Lee, J.: Automatic rule-based checking of building designs. Automation in Construction\u00a018(8), 1011\u20131033 (2009)","journal-title":"Automation in Construction"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-73538-0_19","volume-title":"Data and Applications Security XXI","author":"E.B. Fernandez","year":"2007","unstructured":"Fernandez, E.B., Ballesteros, J., Desouza-Doucet, A.C., Larrondo-Petrie, M.M.: Security Patterns for Physical Access Control Systems. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 259\u2013274. Springer, Heidelberg (2007)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Fitzgerald, W.M., Turkmen, F., Foley, S.N., O\u2019Sulliva, B.: Anomaly analysis for physical access control security configuration. In: Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (2012)","DOI":"10.1109\/CRISIS.2012.6378953"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1504\/IJESDF.2007.013589","volume":"1","author":"I. Flechais","year":"2007","unstructured":"Flechais, I., Mascolo, C., Sasse, M.A.: Integrating security and usability into the requirements and design process. International Journal of Electronic Security and Digital Forensics\u00a01(1), 12\u201326 (2007)","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"19_CR12","unstructured":"Fortem Inc.: Omnipresence 3D Central Command (2012), http:\/\/www.fortem.com\/index.php?page=central-command"},{"key":"19_CR13","unstructured":"Gallagher Group Ltd.: Gallagher Command Centre (2012), http:\/\/security.gallagher.co\/products\/gallagher-products\/command-centre-core-features\/"},{"key":"19_CR14","unstructured":"Garfinkel, S.L.: Design principles and patterns for computer systems that are simultaneously secure and usable. PhD thesis (2005)"},{"key":"19_CR15","unstructured":"Gr\u00f6ger, G., Kolbe, T.H., Nagel, C., H\u00e4fele, K.H.: OGC City Geography Markup Language (CityGML) Encoding Standard. Technical Report OGC 12-019, Open Geospatial Consortium Inc. (2012)"},{"key":"19_CR16","first-page":"77","volume-title":"Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008","author":"P. Inglesant","year":"2008","unstructured":"Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L.: Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, pp. 77\u201388. ACM, New York (2008)"},{"issue":"6","key":"19_CR17","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"D.R. Kuhn","year":"2010","unstructured":"Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer\u00a043(6), 79\u201381 (2010)","journal-title":"Computer"},{"key":"19_CR18","unstructured":"Liebich, T., Adachi, Y., Forester, J., Hyvarinen, J., Karstila, K., Reed, K., Richter, S., Wix, J.: Buildingsmart: Industry Foundation Classes, IFC2x Edition 4 Release Candidate 2 (August 2010), http:\/\/buildingsmart-tech.org\/"},{"key":"19_CR19","series-title":"GeoJournal Library","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-90-481-8572-6_11","volume-title":"Geospatial Analysis and Modelling of Urban Structure and Dynamics","author":"D. Mandloi","year":"2010","unstructured":"Mandloi, D., Thill, J.C.: Object-oriented data modeling of an indoor\/outdoor urban transportation network and route planning analysis. In: Jiang, B., Yao, X. (eds.) Geospatial Analysis and Modelling of Urban Structure and Dynamics. GeoJournal Library, vol.\u00a099, pp. 197\u2013220. Springer, Netherlands (2010)"},{"issue":"1-2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijhcs.2005.04.009","volume":"63","author":"R.A. Maxion","year":"2005","unstructured":"Maxion, R.A., Reeder, R.W.: Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies\u00a063(1-2), 25\u201350 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"1","key":"19_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1108\/02756660510575014","volume":"26","author":"D. Minnick","year":"2005","unstructured":"Minnick, D., Ireland, R.: Inside the new organization: a blueprint for surviving restructuring, downsizing, acquisitions and outsourcing. Journal of Business Strategy\u00a026(1), 18\u201325 (2005)","journal-title":"Journal of Business Strategy"},{"key":"19_CR22","unstructured":"Moses, T.: Extensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard. Technical report, OASIS Open (February 2005)"},{"key":"19_CR23","first-page":"1056","volume-title":"CHI 2003 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2003","author":"A.S. Patrick","year":"2003","unstructured":"Patrick, A.S., Long, A.C., Flinn, S.: HCI and security systems. In: CHI 2003 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2003, pp. 1056\u20131057. ACM, New York (2003)"},{"issue":"7237","key":"19_CR24","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1136\/bmj.320.7237.768","volume":"320","author":"J. Reason","year":"2000","unstructured":"Reason, J.: Human error: models and management. BMJ\u00a0320(7237), 768\u2013770 (2000)","journal-title":"BMJ"},{"issue":"1","key":"19_CR25","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/S1007-0214(08)70175-5","volume":"13","author":"U. Rueppel","year":"2008","unstructured":"Rueppel, U., Stuebbe, K.M.: BIM-based indoor-emergency-navigation-system for complex buildings. Tsinghua Science & Technology\u00a013(1), 362\u2013367 (2008)","journal-title":"Tsinghua Science & Technology"},{"key":"19_CR26","unstructured":"Shuchi, S., Drogemuller, R., Kleinschmidt, T.: Flexible airport terminal design: towards a framework. In: Tang, L.C., Watson, G.H. (eds.) Proceedings of the IIE Asian Conference 2012, Singapore. Department of Industrial & Systems Engineering, NUS, pp. 348\u2013356 (June 2012)"},{"key":"19_CR27","unstructured":"Siemens Building Technologies Group: SiPass Integrated (2012), http:\/\/www.siemens.com.au\/security-access-manage"},{"issue":"10","key":"19_CR28","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1093\/comjnl\/bxs098","volume":"55","author":"N. Skandhakumar","year":"2012","unstructured":"Skandhakumar, N., Reid, J., Dawson, E., Drogemuller, R., Salim, F.: An authorization framework using building information models. The Computer Journal\u00a055(10), 1244\u20131264 (2012)","journal-title":"The Computer Journal"},{"issue":"3","key":"19_CR29","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.autcon.2008.10.003","volume":"18","author":"B. Succar","year":"2009","unstructured":"Succar, B.: Building information modelling framework: A research and delivery foundation for industry stakeholders. Automation in Construction\u00a018(3), 357\u2013375 (2009)","journal-title":"Automation in Construction"},{"key":"19_CR30","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/INFVIS.2001.963291","volume-title":"Proceedings of the 2001 IEEE Symposium on Information Visualization, INFOVIS 2001","author":"M. Tavanti","year":"2001","unstructured":"Tavanti, M., Lind, M.: 2D vs 3D, implications on spatial memory. In: Proceedings of the 2001 IEEE Symposium on Information Visualization, INFOVIS 2001, pp. 139\u2013145. IEEE Computer Society, Washington, DC (2001)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T20:03:55Z","timestamp":1576181035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}