{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:28:25Z","timestamp":1761395305710,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,8,18]],"date-time":"2018-08-18T00:00:00Z","timestamp":1534550400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00607-018-0654-1","type":"journal-article","created":{"date-parts":[[2018,8,18]],"date-time":"2018-08-18T07:27:57Z","timestamp":1534577277000},"page":"743-772","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2421-2214","authenticated-orcid":false,"given":"A. S. M.","family":"Kayes","sequence":"first","affiliation":[]},{"given":"Wenny","family":"Rahayu","sequence":"additional","affiliation":[]},{"given":"Tharam","family":"Dillon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,18]]},"reference":[{"issue":"9","key":"654_CR1","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1002\/cpe.1629","volume":"23","author":"TS Dillon","year":"2011","unstructured":"Dillon TS, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyber-physical systems. Concurr Comput Pract Exp 23(9):905\u2013923","journal-title":"Concurr Comput Pract Exp"},{"key":"654_CR2","doi-asserted-by":"crossref","unstructured":"Dillon TS, Talevski A, Potdar V, Chang E (2009) Web of things as a framework for ubiquitous intelligence and computing. In: International conference on ubiquitous intelligence and computing. Springer, Berlin, pp 2\u201313","DOI":"10.1007\/978-3-642-02830-4_2"},{"issue":"11","key":"654_CR3","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1093\/comjnl\/bxv034","volume":"58","author":"ASM Kayes","year":"2015","unstructured":"Kayes ASM, Han J, Colman A (2015) OntCAAC: an ontology-based approach to context-aware access control for software services. Comput J 58(11):3000\u20133034","journal-title":"Comput J"},{"key":"654_CR4","doi-asserted-by":"crossref","unstructured":"Kayes A, Rahayu W, Dillon T (2018) An ontology-based approach to dynamic contextual role for pervasive access control. In: AINA 2018. IEEE Computer Society","DOI":"10.1109\/AINA.2018.00093"},{"key":"654_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29:38\u201347","journal-title":"IEEE Comput"},{"issue":"3","key":"654_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. TISSEC 4(3):224\u2013274","journal-title":"TISSEC"},{"key":"654_CR7","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2016.09.006","volume":"75","author":"R Gravina","year":"2017","unstructured":"Gravina R, Ma C, Pace P, Aloi G, Russo W, Li W, Fortino G (2017) Cloud-based activity-aaservice cyber-physical framework for human activity monitoring in mobility. Future Gener Comput Syst 75:158\u2013171","journal-title":"Future Gener Comput Syst"},{"key":"654_CR8","unstructured":"Chandran SM, Joshi JBD (2005) LoT-RBAC: a location and time-based RBAC model. In: WISE, pp 361\u2013375"},{"issue":"2","key":"654_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1065545.1065547","volume":"8","author":"R Bhatti","year":"2005","unstructured":"Bhatti R, Ghafoor A, Bertino E, Joshi J (2005) X-gtrbac: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans Inf Syst Secur 8(2):187\u2013227","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"3","key":"654_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino E, Bonatti PA, Ferrari E (2001) Trbac: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191\u2013233","journal-title":"ACM Trans Inf Syst Secur"},{"key":"654_CR11","doi-asserted-by":"crossref","unstructured":"Zhang H, He Y, Shi Z (2006) Spatial context in role-based access control. In: ICISC, pp 166\u2013178","DOI":"10.1007\/11927587_15"},{"key":"654_CR12","doi-asserted-by":"crossref","unstructured":"Bijon KZ, Krishnan R, Sandhu R (2012) Risk-aware RBAC sessions. In: ICISS. Springer, Berlin, pp 59\u201374","DOI":"10.1007\/978-3-642-35130-3_5"},{"issue":"4","key":"654_CR13","doi-asserted-by":"publisher","first-page":"65:1","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv 49(4):65:1\u201365:45","journal-title":"ACM Comput Surv"},{"issue":"3","key":"654_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MITP.2013.37","volume":"15","author":"E Coyne","year":"2013","unstructured":"Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):14\u201316","journal-title":"IT Prof"},{"key":"654_CR15","doi-asserted-by":"crossref","unstructured":"Jin X, Sandhu RS, Krishnan R (2012) RABAC: role-centric attribute-based access control. In: Computer network security\u20146th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17\u201319, 2012. Proceedings, pp 84\u201396","DOI":"10.1007\/978-3-642-33704-8_8"},{"key":"654_CR16","unstructured":"Kim YG, Lim J (2007) Dynamic activation of role on rbac for ubiquitous applications. In: ICCIT. IEEE, pp 1148\u20131153"},{"issue":"3","key":"654_CR17","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1145\/1015040.1015043","volume":"7","author":"M Strembeck","year":"2004","unstructured":"Strembeck M, Neumann G (2004) An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans Inf Syst Secur (TISSEC) 7(3):392\u2013427","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"654_CR18","doi-asserted-by":"crossref","unstructured":"Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies. ACM, pp 113\u2013122","DOI":"10.1145\/1377836.1377854"},{"issue":"1\u20138","key":"654_CR19","first-page":"6","volume":"8","author":"S Hosseinzadeh","year":"2016","unstructured":"Hosseinzadeh S, Virtanen S, D\u00edaz-Rodr\u00edguez N, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. SBD, ACM 8(1\u20138):6","journal-title":"SBD, ACM"},{"key":"654_CR20","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.is.2015.03.011","volume":"53","author":"ASM Kayes","year":"2015","unstructured":"Kayes ASM, Han J, Colman AW (2015) An ontological framework for situation-aware access control of software services. Inf Syst 53:253\u2013277","journal-title":"Inf Syst"},{"key":"654_CR21","doi-asserted-by":"crossref","unstructured":"Kayes ASM, Han J, Colman A, Islam MS (2014) Relboss: a relationship-aware access control framework for software services. In: CoopIS, pp 258\u2013276","DOI":"10.1007\/978-3-662-45563-0_15"},{"key":"654_CR22","doi-asserted-by":"crossref","unstructured":"Kayes ASM, Han J, Colman A (2014) PO-SAAC: a purpose-oriented situation-aware access control framework for software services. In: CAiSE, pp 58\u201374","DOI":"10.1007\/978-3-319-07881-6_5"},{"key":"654_CR23","doi-asserted-by":"crossref","unstructured":"Kayes A, Rahayu W, Dillon T, Chang E, Han J (2017) Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach. In: CoopIS 2017. Springer, Berlin, pp 132\u2013153","DOI":"10.1007\/978-3-319-69462-7_10"},{"issue":"4","key":"654_CR24","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.cogpsych.2007.03.001","volume":"56","author":"L Oksama","year":"2008","unstructured":"Oksama L, Hy\u00f6n\u00e4 J (2008) Dynamic binding of identity and location information: a serial model of multiple identity tracking. Cogn Psychol 56(4):237\u2013283","journal-title":"Cogn Psychol"},{"key":"654_CR25","unstructured":"OWL: Web Ontology Language (2017). \n                    http:\/\/www.w3.org\/2007\/owl\/"},{"key":"654_CR26","unstructured":"SWRL: Semantic Web Rule Language (2017). \n                    http:\/\/www.w3.org\/submission\/swrl\/"},{"key":"654_CR27","unstructured":"SWRL-Built-Ins: SWRL Built-Ins for comparisons, Boolean values and Math Built-Ins (2017). \n                    http:\/\/www.daml.org\/2004\/04\/swrl\/builtins.html"},{"key":"654_CR28","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.pmcj.2011.02.001","volume":"7","author":"D Riboni","year":"2011","unstructured":"Riboni D, Bettini C (2011) Owl 2 modeling and reasoning with complex human activities. Pervasive Mob Comput 7:379\u2013395","journal-title":"Pervasive Mob Comput"},{"key":"654_CR29","unstructured":"Prot\u00e9g\u00e9: Prot\u00e9g\u00e9-OWL API (2017). \n                    http:\/\/protege.stanford.edu\/"},{"key":"654_CR30","unstructured":"Prot\u00e9g\u00e9-OWLSWRLTab (2017). \n                    https:\/\/protegewiki.stanford.edu\/wiki\/swrltab"},{"key":"654_CR31","unstructured":"Jess: Jess rule engine (2017). \n                    http:\/\/herzberg.ca.sandia.gov\/"},{"key":"654_CR32","unstructured":"ASCO: Australian Standard Classification of Occupations: Health Professionals (2017). \n                    http:\/\/www.abs.gov.au\/"},{"key":"654_CR33","unstructured":"HL7: Health Level Seven Standard (2017). \n                    http:\/\/www.hl7.org.au\/"},{"key":"654_CR34","doi-asserted-by":"crossref","unstructured":"Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: SACMAT, pp 29\u201337","DOI":"10.1145\/1063979.1063985"},{"issue":"1","key":"654_CR35","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J Joshi","year":"2005","unstructured":"Joshi J, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"654_CR36","doi-asserted-by":"publisher","first-page":"709","DOI":"10.3233\/JCS-150539","volume":"23","author":"P Bonatti","year":"2015","unstructured":"Bonatti P, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709\u2013757","journal-title":"J Comput Secur"},{"key":"654_CR37","doi-asserted-by":"crossref","unstructured":"Trnka M, Cern\u00fd T (2016) On security level usage in context-aware role-based access control. In: SAC, pp 1192\u20131195","DOI":"10.1145\/2851613.2851664"},{"key":"654_CR38","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh S, Virtanen S, Rodr\u00edguez ND, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. In: SBD@SIGMOD, pp 1\u20136","DOI":"10.1145\/2928294.2928300"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0654-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0654-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0654-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T19:15:11Z","timestamp":1566069311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0654-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,18]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["654"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0654-1","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2018,8,18]]},"assertion":[{"value":"15 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}