{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T20:40:11Z","timestamp":1741639211650,"version":"3.38.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T00:00:00Z","timestamp":1315958400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s00779-011-0448-3","type":"journal-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T06:28:06Z","timestamp":1315895286000},"page":"799-818","source":"Crossref","is-referenced-by-count":8,"title":["Context provenance to enhance the dependability of ambient intelligence systems"],"prefix":"10.1007","volume":"16","author":[{"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,14]]},"reference":[{"issue":"1","key":"448_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJWET.2009.025011","volume":"5","author":"A Agostini","year":"2009","unstructured":"Agostini A, Bettini C, Riboni D (2009) Hybrid reasoning in the care middleware for context awareness. Int J Web Eng Technol 5(1):3\u201323","journal-title":"Int J Web Eng Technol"},{"doi-asserted-by":"crossref","unstructured":"Allen MD, Chapman A, Blaustein BT, Seligman L (2010) Capturing provenance in the wild. In: Proceedings of provenance and annotation of data and processes. Lecture notes in computer science, vol 6378. Springer, pp 98\u2013101","key":"448_CR2","DOI":"10.1007\/978-3-642-17819-1_12"},{"issue":"2","key":"448_CR3","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s00778-007-0080-z","volume":"17","author":"O Benjelloun","year":"2008","unstructured":"Benjelloun O, Sarma AD, Halevy AY, Theobald M, Widom J (2008) Databases with uncertainty and lineage. VLDB J 17(2):243\u2013264","journal-title":"VLDB J."},{"issue":"5","key":"448_CR4","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.pmcj.2008.04.002","volume":"4","author":"C Bettini","year":"2008","unstructured":"Bettini C, Pareschi L, Riboni D (2008) Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. Pervasive Mobile Comput 4(5):697\u2013718","journal-title":"Pervasive and Mobile Computing"},{"issue":"2","key":"448_CR5","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.pmcj.2009.06.002","volume":"6","author":"C Bettini","year":"2010","unstructured":"Bettini C, Brdiczka O, Henricksen K, Indulska J, Nicklas D, Ranganathan A, Riboni D (2010) A survey of context modelling and reasoning techniques. Pervasive Mobile Comput 6(2):161\u2013180","journal-title":"Pervasive Mobile Comput"},{"issue":"2","key":"448_CR6","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.sna.2009.10.012","volume":"156","author":"DE Boyle","year":"2009","unstructured":"Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled wireless sensor networks. Sens Actuat A Phys 156(2):394\u2013405","journal-title":"Sensors Actuat A Phys"},{"unstructured":"Buchholz T, Kpper A, Schiffers M (2003) Quality of context information: what it is and why we need it. In: Proceedings of the 10th HP OpenView University Workshop","key":"448_CR7"},{"doi-asserted-by":"crossref","unstructured":"Chapman A, Jagadish HV, Ramanan P (2008) Efficient provenance storage. In: Proceedings of the ACM SIGMOD international conference on management of data, pp 993\u20131006. ACM","key":"448_CR8","DOI":"10.1145\/1376616.1376715"},{"doi-asserted-by":"crossref","unstructured":"Chen H, Finin T, Joshi A (2004) Semantic web in the context broker architecture. In: Proceedings of the second IEEE international conference on pervasive computing and communications (PerCom 2004), pp 277\u2013286. IEEE Computer Society","key":"448_CR9","DOI":"10.1109\/PERCOM.2004.1276865"},{"doi-asserted-by":"crossref","unstructured":"Chowdhury AR, Falchuk B, Misra A (2010) Medially: A provenance-aware remote health monitoring middleware. In Proceedings of the eight annual IEEE international conference on pervasive computing and communications (PerCom 2010), pp 125\u2013134. IEEE Computer Society","key":"448_CR10","DOI":"10.1109\/PERCOM.2010.5466985"},{"issue":"1","key":"448_CR11","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s00778-002-0083-8","volume":"12","author":"Y Cui","year":"2003","unstructured":"Cui Y, Widom J (2003) Lineage tracing for general data warehouse transformations. VLDB J 12(1):41\u201358","journal-title":"VLDB J"},{"issue":"1","key":"448_CR12","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"AK Dey","year":"2001","unstructured":"Dey AK (2001) Understanding and using context. Pers Ubiquit Comput 5(1):4\u20137","journal-title":"Pers Ubiquit Comput"},{"doi-asserted-by":"crossref","unstructured":"Goix L-W, Valla M, Cerami L, Falcarin P (2007) Situation inference for mobile users: a rule based approach. In: Proceedings of the 8th international conference on mobile data management, pp 299\u2013303. IEEE Computer Society","key":"448_CR13","DOI":"10.1109\/MDM.2007.63"},{"issue":"4","key":"448_CR14","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.websem.2008.05.001","volume":"6","author":"BC Grau","year":"2008","unstructured":"Grau BC, Horrocks I, Motik B, Parsia B, Patel-Schneider PF, Sattler U (2008) OWL 2: the next step for OWL. J Web Semant 6(4):309\u2013322","journal-title":"J Web Semant"},{"doi-asserted-by":"crossref","unstructured":"Hartig O, Zhao J (2010) Publishing and consuming provenance metadata on the web of linked data. In Proceedings of IPAW 2010. Lecture notes in computer science, vol 6378. Springer, pp 78\u201390","key":"448_CR15","DOI":"10.1007\/978-3-642-17819-1_10"},{"unstructured":"Hasan R, Sion R, Winslett M (2009) The case of the fake picasso: preventing history forgery with secure provenance. In Proceedings of the 7th conference on file and storage technologies. USENIX Association, pp 1\u201314","key":"448_CR16"},{"doi-asserted-by":"crossref","unstructured":"Heinis T, Alonso G (2008) Efficient lineage tracking for scientific workflows. In Proceedings of ACM SIGMOD. ACM, pp 1007\u20131018","key":"448_CR17","DOI":"10.1145\/1376616.1376716"},{"unstructured":"Horrocks I, Patel-Schneider PF, van Harmelen F (2003) From SHIQ and RDF to OWL: the making of a web ontology language. J Web Semant 1(1):7\u201326. ISSN 1570-8268","key":"448_CR18"},{"unstructured":"Horrocks I, Patel-Schneider PF, Boley H, Tabet S, Grosof B, Dean M (2004) SWRL: a semantic web rule language combining OWL and RuleML. W3c member submission, W3C, May 2004. URL http:\/\/www.w3.org\/Submission\/2004\/SUBM-SWRL-20040521\/","key":"448_CR19"},{"doi-asserted-by":"crossref","unstructured":"Huang V, Chu J (2010) Sensor information decay process modeling. In: Proceedings of the fourth international conference on sensor technologies and applications. IEEE Computer Society, pp 287\u2013292","key":"448_CR20","DOI":"10.1109\/SENSORCOMM.2010.51"},{"unstructured":"International Organization for Standardization: ISO 8601 (2004) Data elements and interchange formats\u2014information interchange\u2014representation of dates and times. Technical report, ISO, Geneva, Switzerland, 2004. URL http:\/\/www.iso.ch\/cate\/d40874.html","key":"448_CR21"},{"unstructured":"Kellokumpu V, Pietik\u00e4inen M, Heikkil\u00e4 J (2005) Human activity recognition using sequences of postures. In: Proceedings of the IAPR conference on machine vision applications, pp 570\u2013573","key":"448_CR22"},{"issue":"2\/3","key":"448_CR23","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz N, Menezes A, Vanstone SA (2000) The state of elliptic curve cryptography. Des Codes Crypt 19(2\/3):173\u2013193","journal-title":"Des Codes Crypt"},{"key":"448_CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.entcs.2009.03.014","volume":"236","author":"Gabriele Lenzini","year":"2009","unstructured":"Lenzini G (2009) Design of architectures for proximity-aware services: experiments in context-based authentication with subjective logic. Electron Notes Theor Comput Sci 236:47\u201364","journal-title":"Electronic Notes in Theoretical Computer Science"},{"unstructured":"Lester J, Choudhury T, Kern, Nicky B, Gaetan HB (2005) A hybrid discriminative\/generative approach for modeling human activities. In: Leslie PK, Alessandro S (eds) IJCAI-05, proceedings of the nineteenth international joint conference on artificial intelligence. Professional Book Center, pp 766\u2013772","key":"448_CR25"},{"issue":"1-3","key":"448_CR26","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s10817-006-9049-7","volume":"38","author":"C Lutz","year":"2007","unstructured":"Lutz C, Milicic M (2007) A tableau algorithm for description logics with concrete domains and general tboxes. J Autom Reason 38(1\u20133):227\u2013259","journal-title":"J Autom Reason"},{"doi-asserted-by":"crossref","unstructured":"Malan DJ, Welsh M, Smith MD (2004) A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proceedings of the first annual IEEE communications society conference on sensor and Ad Hoc communications and networks. IEEE Computer Society, pp 71\u201380","key":"448_CR27","DOI":"10.1109\/SAHCN.2004.1381904"},{"unstructured":"Mayrhofer R, Radi H, Ferscha A (2003) Recognizing and predicting context by learning from user behavior. In Schreiner W, Kotsis G, Ferscha A, Ibrahim K (eds) Proceedings of MoMM 2003: 1st international conference on advances in mobile multimedia. vol 171. Austrian Computer Society (OCG), pp 25\u201335","key":"448_CR28"},{"unstructured":"McGuinness DL, Ding LI, da Silva, PP, Chang C (2007) Pml 2: a modular explanation interlingua. In: Proceedings of the 2007 AAAI workshop on explanation-aware computing, vol WS-07-06 of AAAI technical report. AAAI Press, pp 49\u201355.","key":"448_CR29"},{"issue":"2-3","key":"448_CR30","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1561\/1800000010","volume":"2","author":"Luc Moreau","year":"2010","unstructured":"Moreau Luc (2010) The foundations for provenance on the web. Found Trends Web Sci 2(2\u20133):99\u2013241","journal-title":"Foundations and Trends in Web Science"},{"issue":"6","key":"448_CR31","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"27","author":"L Moreau","year":"2011","unstructured":"Moreau L, Clifford B, Freire J, Futrelle J, Gil Y, Groth PT, Kwasnikowska N, Miles S, Missier P, Myers J, Plale B, Simmhan Y, Stephan EG, Vanden BJ(2011) The open provenance model core specification (v1.1). Future Gener Compt Syst 27(6):743\u2013756","journal-title":"Future Gener Comp Syst"},{"unstructured":"Moni N, Moti Y (1989) Universal one-way hash functions and their cryptographic applications. In Proceedings of the twenty-first annual ACM symposium on theory of computing. ACM, pp 33\u201343","key":"448_CR32"},{"doi-asserted-by":"crossref","unstructured":"Ranganathan A, Al-Muhtadi J, Chetan S, Campbell RH, Mickunas MD (2004) Middlewhere: a middleware for location awareness in ubiquitous computing applications. In Proceedings of Middleware 2004. Lecture notes in computer science, vol 3231. Springer, pp 397\u2013416","key":"448_CR33","DOI":"10.1007\/978-3-540-30229-2_21"},{"doi-asserted-by":"crossref","unstructured":"Riboni D, Bettini C (2011) COSAR: hybrid reasoning for context-aware activity recognition. Person Ubiquit Comput 7(3):379\u2013395","key":"448_CR34","DOI":"10.1007\/s00779-010-0331-7"},{"doi-asserted-by":"crossref","unstructured":"Riboni D, Pareschi L, Bettini C (2009) Privacy in georeferenced context-aware services: a survey. In Privacy in location-based applications. Lecture notes in computer science, vol 5599. Springer, pp 151\u2013172","key":"448_CR35","DOI":"10.1007\/978-3-642-03511-1_7"},{"unstructured":"Sahoo SS, Sheth A (2009) Provenir ontology: towards a framework for escience provenance management. In: Microsoft eScience workshop. Microsoft","key":"448_CR36"},{"doi-asserted-by":"crossref","unstructured":"Sarma AD, Theobald M, Widom J (2008) Exploiting lineage for confidence computation in uncertain and probabilistic databases. In Proceedings of ICDE 2008. IEEE Comput Soc, pp 1023\u20131032","key":"448_CR37","DOI":"10.1109\/ICDE.2008.4497511"},{"issue":"3","key":"448_CR38","first-page":"83","volume":"3","author":"Kamran Sheikh","year":"2008","unstructured":"Sheikh K, Wegdam M, van Sinderen M (2008) Quality-of-context and its use for protecting privacy in context aware systems. J Softw 3(3):83\u201393","journal-title":"Journal of Software"},{"issue":"3","key":"448_CR39","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"Y Simmhan","year":"2005","unstructured":"Simmhan Y, Plale B, Gannon D (2005) A survey of data provenance in e-science. SIGMOD Rec 34(3):31\u201336","journal-title":"SIGMOD Record"},{"issue":"(2","key":"448_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jwsr.2008040101","volume":"5","author":"YL Simmhan","year":"2008","unstructured":"Simmhan YL, Plale B, Gannon D (2008) Karma2: provenance management for data-driven workflows. Int J Web Serv Res 5(2):1\u201322","journal-title":"Int J Web Serv Res"},{"issue":"3","key":"448_CR41","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.adhoc.2005.01.002","volume":"3","author":"B Sundararaman","year":"2005","unstructured":"Sundararaman B, Buy U, Kshemkalyani AD (2005) Clock synchronization for wireless sensor networks: a survey. Ad Hoc Netw 3(3):281\u2013323","journal-title":"Ad Hoc Netw"},{"unstructured":"van K, Tim N, Athanasios K, Englebienne G, Kr\u00f6se BJA (2008) Accurate activity recognition in a home setting. In: Proceedings of UbiComp 2008. ACM international conference proceeding series, vol 344. ACM, pp 1\u20139","key":"448_CR42"},{"issue":"(4","key":"448_CR43","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1007\/s11276-009-0184-z","volume":"16","author":"H Wang","year":"2010","unstructured":"Wang H, Li Q (2010) Achieving robust message authentication in sensor networks: a public-key based approach. Wirel Netw 16(4):999\u20131009","journal-title":"Wireless Netw"},{"unstructured":"Wessel M (2001) Obstacles on the way to qualitative spatial reasoning with description logics: some undecidability results. In International description logics workshop (DL-2001). CEUR workshop proceedings, vol 49. CEUR-WS.org, pp 122\u2013131","key":"448_CR44"},{"issue":"2","key":"448_CR45","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.datak.2004.09.004","volume":"54","author":"G Yavas","year":"2005","unstructured":"Yavas G, Katsaros D, Ulusoy \u00d6, Manolopoulos Y (2005) A data mining approach for location prediction in mobile environments. Data Knowl Eng 54(2):121\u2013146","journal-title":"Data Knowl Eng"},{"doi-asserted-by":"crossref","unstructured":"Zhang J, Chapman A, LeFevre K (2009) Do you know where your data\u2019s been?\u2014Tamper-evident database provenance. In Proceedings of secure data management, 6th VLDB workshop. Lecture notes in computer science, vol 5776. Springer, pp 17\u201332","key":"448_CR46","DOI":"10.1007\/978-3-642-04219-5_2"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0448-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0448-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0448-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T19:34:42Z","timestamp":1741635282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0448-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,14]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["448"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0448-3","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2011,9,14]]}}}