{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:42Z","timestamp":1725725442056},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_53","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"501-508","source":"Crossref","is-referenced-by-count":1,"title":["QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments"],"prefix":"10.1007","author":[{"given":"Yao","family":"Ma","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zaobin","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"53_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and Using Context. Personal and Ubiquitous Computing\u00a05(1), 4\u20137 (2001)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"53_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., et al.: Proposed NIST Standard for Role-based Access Control. ACM Trans. on Info. and Sys. Sec.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. on Info. and Sys. Sec."},{"key":"53_CR3","first-page":"561","volume-title":"Proc. of the IEEE Intl. Conf. on Web Services","author":"E. Yuan","year":"2005","unstructured":"Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for Web services. In: Proc. of the IEEE Intl. Conf. on Web Services, pp. 561\u2013569. IEEE CS, Washington (2005)"},{"key":"53_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/11847366_59","volume-title":"High Performance Computing and Communications","author":"S.H. Park","year":"2006","unstructured":"Park, S.H., Han, Y.J., Chung, T.M.: Context-role based access control for context-aware application. In: Gerndt, M., Kranzlm\u00fcller, D. (eds.) HPCC 2006. LNCS, vol.\u00a04208, pp. 572\u2013580. Springer, Heidelberg (2006)"},{"key":"53_CR5","first-page":"113","volume-title":"Proc. of the 13th ACM Symp. on Access Control Models and Technologies","author":"D. Kulkarni","year":"2008","unstructured":"Kulkarni, D., Tripathi, A.: Context-aware Role-based Access Control in Pervasive Computing Systems. In: Proc. of the 13th ACM Symp. on Access Control Models and Technologies, pp. 113\u2013122. ACM, New York (2008)"},{"key":"53_CR6","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.cose.2012.02.002","volume":"31","author":"Y. Jung","year":"2012","unstructured":"Jung, Y., Joshi, J.B.D.: CRiBAC: Community-centric Role Interaction Based Access Control Model. Computers & Security\u00a031, 497\u2013523 (2012)","journal-title":"Computers & Security"},{"key":"53_CR7","first-page":"489","volume-title":"Proc. of the 1st IEEE Intl. Conf. on Pervasive Computing and Communications","author":"J. Al-Muhtadi","year":"2003","unstructured":"Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a Context-aware Security Scheme for Smart Spaces. In: Proc. of the 1st IEEE Intl. Conf. on Pervasive Computing and Communications, pp. 489\u2013496. IEEE CS, Los Alamitos (2003)"},{"key":"53_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1667502.1667507","volume-title":"Proc. of the 2nd SIGSPATIAL ACM GIS 2009 Intl. Workshop on Security and Privacy in GIS and LBS","author":"J.B. Filho","year":"2009","unstructured":"Filho, J.B., Martin, H.: A Generalized Context-based Access Control Model for Pervasive Environments. In: Proc. of the 2nd SIGSPATIAL ACM GIS 2009 Intl. Workshop on Security and Privacy in GIS and LBS, pp. 12\u201321. ACM, New York (2009)"},{"key":"53_CR9","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-01802-2_18","volume-title":"Mobile Wireless Middleware, Operating Systems, and Applications","author":"A. Toninelli","year":"2009","unstructured":"Toninelli, A., Corradi, A., Montanari, R.: A Quality of Context-aware Approach to Access Control in Pervasive Environments. In: Bonnin, J.-M., Giannelli, C., Magedanz, T. (eds.) Mobilware 2009. LNICST, vol.\u00a07, pp. 236\u2013251. Springer, Heidelberg (2009)"},{"key":"53_CR10","unstructured":"Buchholz, T., K\u00fcpper, A., Schiffers, M.: Quality of Context: What it is and Why We Need it. In: Proc. of the 10th Intl. Workshop of the HP OpenView University Association, Geneva, Switzerland (2003)"},{"issue":"1","key":"53_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"E.H. Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller. Intl. Journal of Man-Machine Studies\u00a07(1), 1\u201313 (1975)","journal-title":"Intl. Journal of Man-Machine Studies"},{"issue":"2","key":"53_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.pmcj.2009.06.002","volume":"6","author":"C. Bettini","year":"2010","unstructured":"Bettini, C., Brdiczka, O., Henricksen, K., et al.: A Survey of Context Modelling and Reasoning Techniques. Pervasive and Mobile Computing\u00a06(2), 161\u2013180 (2010)","journal-title":"Pervasive and Mobile Computing"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T21:38:43Z","timestamp":1557697123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}