{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:51:00Z","timestamp":1725745860356},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_20","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T01:53:28Z","timestamp":1376877208000},"page":"289-303","source":"Crossref","is-referenced-by-count":1,"title":["Towards a Pervasive Access Control within Video Surveillance Systems"],"prefix":"10.1007","author":[{"given":"Dana Al","family":"Kukhun","sequence":"first","affiliation":[]},{"given":"Dana","family":"Codreanu","sequence":"additional","affiliation":[]},{"given":"Ana-Maria","family":"Manzat","sequence":"additional","affiliation":[]},{"given":"Florence","family":"Sedes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"Security in Computing Systems: Challenges, Approaches and Solutions","author":"J. Biskup","year":"2008","unstructured":"Biskup, J.: Security in Computing Systems: Challenges, Approaches and Solutions, 1st edn. Springer Publishing Company, Incorporated (2008)","edition":"1"},{"issue":"8","key":"20_CR2","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"key":"20_CR3","unstructured":"N.I. of Standards and Technology, Assessment of access control systems, Interagency Report 7316 (2006)"},{"key":"20_CR4","unstructured":"Ferraiolo, D., Kuhn, D.: Role-based access controls. In: 15th National Computer Security Conference. NSA\/NIST, pp. 554\u2013563 (1992)"},{"key":"20_CR5","unstructured":"OASIS, A brief introduction to XACML (March 2003)"},{"issue":"3","key":"20_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur.\u00a04(3), 191\u2013233 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"20_CR7","unstructured":"Hansen, F., Oleshchuk, V.: SRBAC: A spatial role-based access control model for mobile systems. In: Proceedings of the 7th Nordic Workshop on Secure IT Systems (2003)"},{"key":"20_CR8","unstructured":"Zhang, G., Parashar, M.: Dynamic context-aware access control for grid applications. In: Proceedings of the 4th International Workshop on Grid Computing, pp. 101\u2013108. IEEE Computer Society (2003)"},{"issue":"1","key":"20_CR9","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1093\/ietfec\/e89-a.1.238","volume":"89-A","author":"S.H. Chae","year":"2006","unstructured":"Chae, S.H., Kim, W., Kim, D.-K.: uT-RBAC: Ubiquitous role-based access control model. IEICE Transactions\u00a089-A(1), 238\u2013239 (2006)","journal-title":"IEICE Transactions"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT, pp. 113\u2013122. ACM (2008)","DOI":"10.1145\/1377836.1377854"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Povey, D.: Optimistic security: a new access control paradigm. In: Proceedings of the 1999 Workshop on New Security Paradigms, pp. 40\u201345. ACM (1999)","DOI":"10.1145\/335169.335188"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/11861386_38","volume-title":"Security Protocols","author":"E. Rissanen","year":"2006","unstructured":"Rissanen, E., Firozabadi, B.S., Sergot, M.J.: Towards a mechanism for discretionary overriding of access control. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol.\u00a03957, pp. 312\u2013319. Springer, Heidelberg (2006)"},{"key":"20_CR13","unstructured":"Joint NEMA\/COCIR\/JIRA Security and Privacy Committee (SPC), Break-glass - an approach to granting emergency access to healthcare systems. White paper (2004)"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MIC.2008.18","volume":"12","author":"T. Catarci","year":"2008","unstructured":"Catarci, T., de Leoni, M., Marrella, A., Mecella, M., Salvatore, B., Vetere, G., Dustdar, S., Juszczyk, L., Manzoor, A., Truong, H.-L.: Pervasive software environments for supporting disaster responses. IEEE Internet Computing\u00a012, 26\u201337 (2008)","journal-title":"IEEE Internet Computing"},{"issue":"5","key":"20_CR15","doi-asserted-by":"publisher","first-page":"629","DOI":"10.3844\/jcssp.2011.629.637","volume":"7","author":"K. Kawagoe","year":"2011","unstructured":"Kawagoe, K., Kasai, K.: Situation, team and role based access control. Journal of Computer Science\u00a07(5), 629\u2013637 (2011)","journal-title":"Journal of Computer Science"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11774716_14","volume-title":"Public Key Infrastructure","author":"M. S\u00e1nchez","year":"2006","unstructured":"S\u00e1nchez, M., L\u00f3pez, G., C\u00e1novas, \u00d3., S\u00e1nchez, J.A., G\u00f3mez-Skarmeta, A.F.: An access control system for multimedia content distribution. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol.\u00a04043, pp. 169\u2013183. Springer, Heidelberg (2006)"},{"key":"20_CR17","unstructured":"El-Khoury, V.: A multi-level access control scheme for multimedia database. In: Proceedings of the 9th Workshop on Multimedia Metadata, WMM 2009 (2009)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Chen, S.-C., Shyu, M.-L., Zhao, N.: Smarxo: towards secured multimedia applications by adopting rbac, xml and object-relational database. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 432\u2013435. ACM (2004)","DOI":"10.1145\/1027527.1027631"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Thuraisingham, B., Lavee, G., Bertino, E., Fan, J., Khan, L.: Access control, confidentiality and privacy for video surveillance databases. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, pp. 1\u201310. ACM (2006)","DOI":"10.1145\/1133058.1133061"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-23091-2_22","volume-title":"Database and Expert Systems Applications","author":"M. Brut","year":"2011","unstructured":"Brut, M., Codreanu, D., Dumitrescu, S., Manzat, A.-M., Sedes, F.: A distributed architecture for flexible multimedia management and retrieval. In: Hameurlain, A., Liddle, S.W., Schewe, K.-D., Zhou, X. (eds.) DEXA 2011, Part II. LNCS, vol.\u00a06861, pp. 249\u2013263. Springer, Heidelberg (2011)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-69916-3_6","volume-title":"Smart Homes and Health Telematics","author":"D. Al Kukhun","year":"2008","unstructured":"Al Kukhun, D., Sedes, F.: Adaptive solutions for access control within pervasive healthcare systems. In: Helal, S., Mitra, S., Wong, J., Chang, C.K., Mokhtari, M. (eds.) ICOST 2008. LNCS, vol.\u00a05120, pp. 42\u201353. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T18:20:24Z","timestamp":1558030824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}