{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:01:12Z","timestamp":1743069672895,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_34","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"369-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Access Control in Cyber-Physical Spaces Using Virtual Perimeters"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7488-2750","authenticated-orcid":false,"given":"Brian","family":"Greaves","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9157-3079","authenticated-orcid":false,"given":"Marijke","family":"Coetzee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9015-6329","authenticated-orcid":false,"given":"Wai Sze","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"34_CR1","first-page":"466","volume":"15","author":"C Tsigkanos","year":"2016","unstructured":"Tsigkanos C, Pasquale L, Ghezzi C, Nuseibeh B (2016) On the interplay between cyber and physical spaces for adaptive security. 15:466\u2013480","journal-title":"On the interplay between cyber and physical spaces for adaptive security"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Jensen CD, Geneser K, Willemoes-Wissing IC (2013) Sensor enhanced access control: extending traditional access control models with context-awareness. In: Presented at the IFIP international conference on trust management","DOI":"10.1007\/978-3-642-38323-6_13"},{"key":"34_CR3","unstructured":"Young-Hyun E, Young-Keun C, Cho S, Jeon B (2017) FloGeo: a floatable three-dimensional geofence with mobility for the internet of things, pp 114\u2013120"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Greaves B, Coetzee M, Leung WS (2018) Access control requirements for physical spaces protected by virtual perimeters. In: International conference on trust and privacy in digital business, pp 182\u2013197","DOI":"10.1007\/978-3-319-98385-1_13"},{"key":"34_CR5","first-page":"40","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu RS, Samarati P (1994) Access control: principle and practice. 32:40\u201348","journal-title":"Access control: principle and practice"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Yamanaka G, Nishio T, Morikura M, Yamamoto K, Maki Y, Eitoku S, Indo T (2019) Geo-fencing in wireless LANs with camera for location-based access control. In: 16th IEEE annual consumer communications & networking conference (CCNC)","DOI":"10.1109\/CCNC.2019.8651877"},{"key":"34_CR7","first-page":"497","volume":"24","author":"Y Cao","year":"2019","unstructured":"Cao Y, Huang Z, Kan S, Fan D, Yang Y (2019) Specification and verification of a topology-aware access control model for cyber-physical space. 24:497\u2013519","journal-title":"Specification and verification of a topology-aware access control model for cyber-physical space"},{"key":"34_CR8","first-page":"1939","volume":"35","author":"G Deak","year":"2012","unstructured":"Deak G, Curran K, Condell J (2012) A survey of active and passive indoor localisation systems. 35:1939\u20131954","journal-title":"A survey of active and passive indoor localisation systems"},{"key":"34_CR9","unstructured":"ZED Stereo Camera. https:\/\/www.stereolabs.com\/zed\/. Last Accessed 16 April 2020"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Greaves B, Coetzee M, Leung WS (2020) A comparison of indoor positioning systems for access control using virtual perimeters. In: Fourth international congress on information and communication technology, pp 293\u2013302","DOI":"10.1007\/978-981-15-0637-6_24"},{"key":"34_CR11","first-page":"1659","volume":"18","author":"JL Hern\u00e1ndez","year":"2014","unstructured":"Hern\u00e1ndez JL, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. 18:1659\u20131674","journal-title":"A soft computing based location-aware access control for smart buildings"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Bonatti P, Galdi C, Torres D (2013) ERBAC: event-driven RBAC. In: Proceedings of the 18th ACM symposium on access control models and technologies, pp 125\u2013136","DOI":"10.1145\/2462410.2462415"},{"key":"34_CR13","unstructured":"Unknown: Tensorflow Object Detection API. https:\/\/github.com\/tensorflow\/models\/tree\/master\/research\/object_daetection. Last Accessed 16 April 2020"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Doll\u00e1r P, Zitnick CL (2014) Microsoft coco: common objects in context. In:\u00a0European conference on computer vision,\u00a0pp 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Wojke N, Bewley A (2018) Deep cosine metric learning for person re-identification. In:\u00a0Proceeding of the winter conference on applications of computer vision (WACV), pp 748\u2013756","DOI":"10.1109\/WACV.2018.00087"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Yap RH, Sim T, Kwang GX, Ramnath R (2008) Physical access protection using continuous authentication. In: IEEE conference on technologies for homeland security","DOI":"10.1109\/THS.2008.4534505"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T16:58:47Z","timestamp":1644339527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_34","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}