{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:40:55Z","timestamp":1709833255184},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,11,3]],"date-time":"2006-11-03T00:00:00Z","timestamp":1162512000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2007,2,28]]},"DOI":"10.1007\/s00779-006-0100-9","type":"journal-article","created":{"date-parts":[[2006,11,2]],"date-time":"2006-11-02T19:38:17Z","timestamp":1162496297000},"page":"157-169","source":"Crossref","is-referenced-by-count":10,"title":["MobiPass: a passport for mobile business"],"prefix":"10.1007","volume":"11","author":[{"given":"Robert","family":"Steele","sequence":"first","affiliation":[]},{"given":"Will","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,11,3]]},"reference":[{"issue":"3","key":"100_CR1","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer of the 21st century. Sci Am 265(3):66\u201375","journal-title":"Sci Am"},{"issue":"12","key":"100_CR2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/585597.585620","volume":"45","author":"A Fano","year":"2002","unstructured":"Fano A, Gershman A (2002) The future of business services in the age of ubiquitous computing. Commun ACM 45(12):83\u201387","journal-title":"Commun ACM"},{"issue":"6","key":"100_CR3","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/s00779-004-0305-8","volume":"8","author":"MS Ackerman","year":"2004","unstructured":"Ackerman MS (2004) Privacy in pervasive environments: next generation labeling protocols. Pers Ubi Comp 8(6):430\u2013439","journal-title":"Pers Ubi Comp"},{"issue":"6","key":"100_CR4","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish P, Grinter E, Delgado de la Flor J , Joseph M (2004) Security in the wild: user strategies for managing security as an everyday. Practical problem. Pers Ubi Comp 8(6):391\u2013401","journal-title":"Pers Ubi Comp"},{"key":"100_CR5","unstructured":"English C, Nixon P, Terzis S, McGettrick A, Lowe H (2002) Dynamic trust models for ubiquitous computing environments, workshop on security in ubiquitous computing, UBICOMP, G\u00f6teborg Sweden. Available at http:\/\/www.teco.edu\/\u223cphilip\/ubicomp2002ws\/organize\/paddy.pdf"},{"issue":"3","key":"100_CR6","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V Cahill","year":"2003","unstructured":"Cahill V, Gray E, Seigneur J-M, Jensen CD, Yong Chen Shand B, Dimmock N, Twigg A, Bacon J, English C, Wagealla W, Terzis S, Nixon P, Di Marzo Serugendo G, Bryce C, Carbone M, Krukow K, Nielson M (2003) Using trust for secure collaboration in uncertain environments. Pervasive Comput IEEE 2(3):52\u201361","journal-title":"Pervasive Comput IEEE"},{"key":"100_CR7","doi-asserted-by":"crossref","unstructured":"Hong J, Landay J (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd international conference on mobile systems, applications, and services, pp 177\u2013189","DOI":"10.1145\/990064.990087"},{"issue":"4","key":"100_CR8","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/641205.641211","volume":"46","author":"K Siau","year":"2003","unstructured":"Siau K, Shen Z (2003) Building customer trust in mobile commerce. Commun ACM 46(4):91\u201394","journal-title":"Commun ACM"},{"issue":"3","key":"100_CR9","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1023\/A:1014570512129","volume":"7","author":"UL Varshney","year":"2002","unstructured":"Varshney UL, Vette RL (2002) Mobile commerce: framework, applications and networking support. Mobile Netw Appl Springer 7(3):185\u2013198","journal-title":"Mobile Netw Appl Springer"},{"issue":"3","key":"100_CR10","first-page":"98","volume":"3","author":"F Nah","year":"2002","unstructured":"Nah F, Davis S (2002). HCI research issues in electronic commerce. J Electron Com Res 3(3):98\u2013113","journal-title":"J Electron Com Res"},{"issue":"2","key":"100_CR11","first-page":"44","volume":"5","author":"SL Jarvenpaa","year":"1999","unstructured":"Jarvenpaa SL, Tractinsky N, Saarinen L, Vitale M (1999). Consumer trust in an Internet store: a cross-cultural validation. J Comput-Med Commun 5(2):44\u201371","journal-title":"J Comput-Med Commun"},{"key":"100_CR12","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/S0963-8687(02)00022-7","volume":"11","author":"V iShankar","year":"2002","unstructured":"iShankar V, Urban GL, Sultan F (2002) Online Trust: a stakeholder perspective, concepts, implications, and future directions. J Strategic Inf Syst 11:325\u2013344","journal-title":"J Strategic Inf Syst"},{"issue":"12","key":"100_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/953460.953484","volume":"46","author":"S Sarker","year":"2003","unstructured":"Sarker S, Wells JD (2003) Understanding mobile handheld device use and adoption. Commun ACM 46(12):35\u201340","journal-title":"Commun ACM"},{"issue":"5","key":"100_CR14","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1504\/IJEB.2004.005143","volume":"2","author":"K Siau","year":"2004","unstructured":"Siau K, Sheng H, Nah F, Davis S (2004) A qualitative investigation on consumer trust in mobile commerce. Int J Electron Bus (IJEB) 2(5):283\u2013300","journal-title":"Int J Electron Bus (IJEB)"},{"key":"100_CR15","unstructured":"Price BA, Adam K, Nuseibeh B (2005) Keeping ubiquitous computing to yourself: a practical model for user control of privacy. Available at http:\/\/www.mcs.open.ac.uk\/ban25\/papers\/ijhcs-2005.pdf"},{"key":"100_CR16","doi-asserted-by":"crossref","unstructured":"Bardram JE (2005) The trouble with login: on usability and computer security in ubiquitous computing. Pers Ubi Comp DOI 10.1007\/s00779-005-0347-6","DOI":"10.1007\/s00779-005-0347-6"},{"key":"100_CR17","doi-asserted-by":"crossref","unstructured":"Steele R, Gardner W, Rajugan R, Dillon TS (2005) A design methodology for user access control (UAC) middleware. In: Proceedings of the 2005 IEEE international conference on e-technology, e-commerce and e-service (EEE\u201905), pp 385\u2013390","DOI":"10.1109\/EEE.2005.4"},{"key":"100_CR18","unstructured":"Turner A (24\/10\/2004) Reasoning about naming systems. The Sydney Morning Herald"},{"issue":"2","key":"100_CR19","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MPRV.2003.1203751","volume":"2","author":"P Kouriuthanassis","year":"2003","unstructured":"Kouriuthanassis P, Roussos G (2003) Developing consumer friendly pervasive retail systems. IEEE Pervasive Comput 2(2):32\u201339","journal-title":"IEEE Pervasive Comput"},{"issue":"6","key":"100_CR20","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/s00779-004-0307-6","volume":"8","author":"T Moussouri","year":"2004","unstructured":"Moussouri T, Roussos G (2004) Consumer perceptions of privacy, security and trust in ubiquitous commerce. Pers Ubiq 8(6):416\u2013429","journal-title":"Pers Ubiq"},{"issue":"4","key":"100_CR21","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/98.944005","volume":"8","author":"R Bellamy","year":"2001","unstructured":"Bellamy R, Swart C, Kellogg WA, Richards J, Brezin J (2001) Designing an E-grocery application for a palm computer: usabilityand interface issues. Pers Commun IEEE 8(4):60\u201364","journal-title":"Pers Commun IEEE"},{"key":"100_CR22","doi-asserted-by":"crossref","unstructured":"Newcomb E, Pashley T, Stasko J (2003) Mobile computing in the retail arena. In: Conference on human factors in computing systems, Proceedings of the SIGCHI conference on human factors in computing systems. Ft. Lauderdale, Florida, USA, pp 337\u2013344","DOI":"10.1145\/642611.642670"},{"key":"100_CR23","doi-asserted-by":"crossref","unstructured":"Steele R, Tao W (2005) An architecture for unifying web services authentication and authorization. In: 3rd International conference on service oriented computing. Amsterdam, The Netherlands, pp 582\u2013587","DOI":"10.1007\/11596141_53"},{"key":"100_CR24","unstructured":"Kagal L, Finin T, Joshi A (2001) A security architecture based on trust management for pervasive computing systems. Grace Hopper Celebration of Women in Computing, October 2002"},{"key":"100_CR25","doi-asserted-by":"crossref","unstructured":"Yang JP, Rhee YH (2005) Securing admission control in ubiquitous computing environment. In: 4th International conference on networking, vol 3421. Lecture notes in Computer Science, Reunion Island, France, April 17\u201321, pp 972\u2013979","DOI":"10.1007\/978-3-540-31957-3_110"},{"key":"100_CR26","unstructured":"W3C, Platform for Privacy Preferences (P3P) Project, (2006), available at http:\/\/www.w3.org\/P3P\/"},{"key":"100_CR27","doi-asserted-by":"crossref","unstructured":"Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: UbiComp 2002, ubiquitous computing: 4th International conference, G\u00f6teborg, Sweden, p 237","DOI":"10.1007\/3-540-45809-3_19"},{"key":"100_CR28","doi-asserted-by":"crossref","unstructured":"Park JS, Sandhu R (1999) RBAC on the Web by smart certificates. In: Symposium on access control models and technologies, Proceedings of the 4th ACM workshop on role-based access control. ACM Press, New York, pp 1\u20139","DOI":"10.1145\/319171.319172"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-006-0100-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-006-0100-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-006-0100-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T15:05:20Z","timestamp":1559142320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-006-0100-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,3]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,2,28]]}},"alternative-id":["100"],"URL":"https:\/\/doi.org\/10.1007\/s00779-006-0100-9","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,11,3]]}}}