{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T01:10:02Z","timestamp":1746148202074,"version":"3.40.4"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,3,8]],"date-time":"2014-03-08T00:00:00Z","timestamp":1394236800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10207-014-0229-x","type":"journal-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T19:18:04Z","timestamp":1394219884000},"page":"571-581","source":"Crossref","is-referenced-by-count":8,"title":["A conceptual model of security context"],"prefix":"10.1007","volume":"13","author":[{"given":"Vladimir","family":"Jovanovikj","sequence":"first","affiliation":[]},{"given":"Du\u0161an","family":"Gabrijel\u010di\u010d","sequence":"additional","affiliation":[]},{"given":"Toma\u017e","family":"Klobu\u010dar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"229_CR1","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","volume-title":"Handheld and Ubiquitous Computing. Lecture Notes in Computer Science","author":"GD Abowd","year":"1999","unstructured":"Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.W. (ed.) Handheld and Ubiquitous Computing. Lecture Notes in Computer Science, vol. 1707, pp. 304\u2013307. Springer, Berlin (1999)"},{"issue":"2\u20133","key":"229_CR2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11235-009-9240-3","volume":"45","author":"A Ahmed","year":"2010","unstructured":"Ahmed, A., Zhang, N.: Towards the realisation of context-risk-aware access control in pervasive computing. Telecommun. Syst. 45(2\u20133), 127\u2013137 (2010)","journal-title":"Telecommun. Syst."},{"key":"229_CR3","doi-asserted-by":"crossref","unstructured":"Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a context-aware security scheme for smart spaces. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, PerCom \u201903, pp. 489\u2013496. IEEE Computer Society (2003)","DOI":"10.1109\/PERCOM.2003.1192774"},{"key":"229_CR4","first-page":"326","volume-title":"Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"G Bai","year":"2010","unstructured":"Bai, G., Gu, L., Feng, T., Guo, Y., Chen, X.: Context-aware usage control for android. In: Jajodia, S., Zhou, J. (eds.) Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 50, pp. 326\u2013343. Springer, Berlin (2010)"},{"issue":"4","key":"229_CR5","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1504\/IJAHUC.2007.014070","volume":"2","author":"M Baldauf","year":"2007","unstructured":"Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2(4), 263\u2013277 (2007)","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"229_CR6","first-page":"134","volume-title":"Security and Privacy in Mobile Information and Communication Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"M Bandinelli","year":"2009","unstructured":"Bandinelli, M., Paganelli, F., Vannuccini, G., Giuli, D.: A context-aware security framework for next generation mobile networks. In: Schmidt, A., Lian, S. (eds.) Security and Privacy in Mobile Information and Communication Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 17, pp. 134\u2013147. Springer, Berlin (2009)"},{"key":"229_CR7","unstructured":"Basole, R.C.: The value and impact of mobile information and communication technologies. In: Proceedings of the IFAC Symposium on Analysis, Modeling & Evaluation of Human-Machine Systems, pp. 1\u20137 (2004)"},{"key":"229_CR8","doi-asserted-by":"crossref","unstructured":"Basole, R.C.: The emergence of the mobile enterprise: a value-driven perspective. In: International Conference on the Management of Mobile Business, ICMB 2007, pp. 41\u201341. IEEE (2007)","DOI":"10.1109\/ICMB.2007.63"},{"key":"229_CR9","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/11508373_3","volume-title":"Modeling and Using Context. Lecture Notes in Computer Science","author":"M Bazire","year":"2005","unstructured":"Bazire, M., Br\u00e9zillon, P.: Understanding context before using it. In: Dey, A., Kokinov, B., Leake, D., Turner, R. (eds.) Modeling and Using Context. Lecture Notes in Computer Science, vol. 3554, pp. 29\u201340. Springer, Berlin (2005)"},{"issue":"2","key":"229_CR10","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.pmcj.2009.06.002","volume":"6","author":"C Bettini","year":"2010","unstructured":"Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A., Riboni, D.: A survey of context modelling and reasoning techniques. Pervasive Mob. Comput. 6(2), 161\u2013180 (2010)","journal-title":"Pervasive Mob. Comput."},{"key":"229_CR11","unstructured":"Bishop, M.A.: The Art and Science of Computer Security. Addison-Wesley, Boston (2002)"},{"key":"229_CR12","unstructured":"Buchholz, T., Schiffers, M.: Quality of context: What it is and why we need it. In: Proceedings of the 10th Workshop of the OpenView University Association: OVUA\u201903 (2003)"},{"key":"229_CR13","first-page":"1","volume-title":"Software Security : Theories and Systems. Lecture Notes in Computer Science","author":"R Campbell","year":"2003","unstructured":"Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) Software Security : Theories and Systems. Lecture Notes in Computer Science, vol. 2609, pp. 1\u201315. Springer, Berlin (2003)"},{"key":"229_CR14","unstructured":"Chen, G., Kotz, D.: A survey of context-aware mobile computing research. Technical report, Department of Computer Science, Dartmouth College (2000)"},{"key":"229_CR15","unstructured":"Clarke, J., Hidalgo, M.G., Lioy, A., Petkovic, M., Vishik, C., Ward, J.: Consumerization of IT: top risks and opportunities. Technical report, European Network and Information Security Agency (ENISA) (2012)"},{"key":"229_CR16","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of the ACM Symposium on Access Control Models and Technologies, SACMAT \u201901, pp. 10\u201320. ACM (2001)","DOI":"10.1145\/373256.373258"},{"issue":"4","key":"229_CR17","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. Int. J. Inf. Secur. 7(4), 285\u2013305 (2008)","journal-title":"Int. J. Inf. Secur."},{"key":"229_CR18","unstructured":"D\u2019Arcy, P.: CIO strategies for consumerization: the future of enterprise mobile computing (2011)"},{"issue":"1","key":"229_CR19","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"AK Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4\u20137 (2001)","journal-title":"Pers. Ubiquitous Comput."},{"issue":"1","key":"229_CR20","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish, P.: What we talk about when we talk about context. Pers. Ubiquitous Comput. 8(1), 19\u201330 (2004)","journal-title":"Pers. Ubiquitous Comput."},{"key":"229_CR21","doi-asserted-by":"crossref","unstructured":"Engestr\u00f6m, Y., et al.: Activity theory and individual and social transformation. Perspectives on activity theory, pp. 19\u201338 (1999)","DOI":"10.1017\/CBO9780511812774.003"},{"key":"229_CR22","doi-asserted-by":"crossref","unstructured":"Evesti, A., Pantsar-Syv\u00e4niemi, S.: Towards micro architecture for security adaptation. In: Proceedings of the European Conference on Software Architecture: Companion Volume, ECSA \u201910, pp. 181\u2013188. ACM (2010)","DOI":"10.1145\/1842752.1842790"},{"key":"229_CR23","first-page":"69","volume-title":"Security and Privacy in Mobile Information and Communication Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"D Feth","year":"2012","unstructured":"Feth, D., Jung, C.: Context-aware, data-driven policy enforcement for smart mobile devices in business environments. In: Schmidt, A., Russello, G., Krontiris, I., Lian, S. (eds.) Security and Privacy in Mobile Information and Communication Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 107, pp. 69\u201380. Springer, Berlin (2012)"},{"key":"229_CR24","doi-asserted-by":"crossref","unstructured":"Frank, K., Kalatzis, N., Roussaki, I., Liampotis, N.: Challenges for context management systems imposed by context inference. In: Proceedings of the International Workshop on Managing Ubiquitous Communications and Services, MUCS \u201909, pp. 27\u201334. ACM (2009)","DOI":"10.1145\/1555321.1555329"},{"key":"229_CR25","doi-asserted-by":"crossref","unstructured":"Ganger, G.R.: Authentication confidences. In: Proceedings of the Workshop on Hot Topics in Operating Systems, HOTOS \u201901, p. 169. IEEE Computer Society (2001)","DOI":"10.1109\/HOTOS.2001.990085"},{"key":"229_CR26","doi-asserted-by":"crossref","unstructured":"Giessmann, A., Stanoevska-Slabeva, K., De Visser, B.: Mobile enterprise applications: current state and future directions. In: Proceedings of the 45th Hawaii International Conference on System Science, HICSS 2012, pp. 1363\u20131372. IEEE (2012)","DOI":"10.1109\/HICSS.2012.435"},{"key":"229_CR27","doi-asserted-by":"crossref","unstructured":"Hachem, S., Toninelli, A., Pathak, A., Issarny, V.: Policy-based access control in mobile social ecosystems. In: Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY \u201911, pp. 57\u201364. IEEE Computer Society (2011)","DOI":"10.1109\/POLICY.2011.50"},{"issue":"3","key":"229_CR28","first-page":"203","volume":"3","author":"M Haque","year":"2006","unstructured":"Haque, M., Ahamed, S.I.: Security in pervasive computing: current status and open issues. Int. J. Netw. Secur. 3(3), 203\u2013214 (2006)","journal-title":"Int. J. Netw. Secur."},{"issue":"3","key":"229_CR29","first-page":"99","volume":"11","author":"J Harris","year":"2012","unstructured":"Harris, J., Ives, B., Junglas, I.: IT consumerization: when gadgets turn into enterprise IT tools. MIS Q. Exec. 11(3), 99\u2013111 (2012)","journal-title":"MIS Q. Exec."},{"issue":"1","key":"229_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/ert.21394","volume":"40","author":"A Hines","year":"2013","unstructured":"Hines, A., Carbone, C.: The future of knowledge work. Employ. Relat. Today 40(1), 1\u201317 (2013)","journal-title":"Employ. Relat. Today"},{"key":"229_CR31","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-540-75696-5_6","volume-title":"Smart Sensing and Context. Lecture Notes in Computer Science","author":"R Hulsebosch","year":"2007","unstructured":"Hulsebosch, R., Bargh, M., Lenzini, G., Ebben, P., Iacob, S.: Context sensitive adaptive authentication. In: Kortuem, G., Finney, J., Lea, R., Sundramoorthy, V. (eds.) Smart Sensing and Context. Lecture Notes in Computer Science, vol. 4793, pp. 93\u2013109. Springer, Berlin (2007)"},{"key":"229_CR32","unstructured":"ISO\/IEC: ISO\/IEC 27002:2005: Information technology\u2014Security techniques\u2014Code of practice for information security management. Technical Report 27002:2005, ISO\/IEC (2005)"},{"key":"229_CR33","unstructured":"ITU-T: Security architecture for open systems interconnection for CCITT applications. Technical Report. Recommendation X.800, International Telecommunications Union (ITU) (1991)"},{"key":"229_CR34","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.procs.2011.07.105","volume":"5","author":"G Johnson","year":"2011","unstructured":"Johnson, G., Shakarian, P., Gupta, N., Agrawala, A.: Towards shrink-wrapped security: practically incorporating context into security services. Procedia Comput. Sci. 5, 782\u2013787 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"229_CR35","doi-asserted-by":"crossref","unstructured":"Johnson, G.M.: Towards shrink-wrapped security: a taxonomy of security-relevant context. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, PerCom \u201909, pp. 1\u20132. IEEE Computer Society (2009)","DOI":"10.1109\/PERCOM.2009.4912819"},{"issue":"3","key":"229_CR36","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.cose.2006.11.002","volume":"26","author":"B Ksiezopolski","year":"2007","unstructured":"Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for dynamic environments. Comput. Secur. 26(3), 246\u2013255 (2007)","journal-title":"Comput. Secur."},{"key":"229_CR37","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: Proceedings of the ACM Symposium on Access Control Models and Technologies, SACMAT \u201908, pp. 113\u2013122. ACM (2008)","DOI":"10.1145\/1377836.1377854"},{"issue":"1","key":"229_CR38","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"M Polla La","year":"2013","unstructured":"La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. Commun. Surv. Tutor. IEEE 15(1), 446\u2013471 (2013)","journal-title":"Commun. Surv. Tutor. IEEE"},{"key":"229_CR39","doi-asserted-by":"crossref","unstructured":"Lacoste, M., Privat, G., Ramparany, F.: Evaluating confidence in context for context-aware security. In: Ambient Intelligence, pp. 211\u2013229. Springer (2007)","DOI":"10.1007\/978-3-540-76652-0_13"},{"issue":"3","key":"229_CR40","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"PK Manadhata","year":"2011","unstructured":"Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"229_CR41","unstructured":"Kouadri-Mostefaoui, G.: Towards a conceptual and software framework for integrating context-based security in pervasive environments. Ph.D. thesis, University of Fribourg (2004)"},{"key":"229_CR42","unstructured":"Niehaves, B., K\u00f6ffer, S., Ortbach, K.: IT consumerization: a theory and practice review. In: Americas Conference on Information Systems, AMCIS 2012 (2012)"},{"key":"229_CR43","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H.F.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law & Politics (2010)","DOI":"10.1515\/9780804772891"},{"issue":"4","key":"229_CR44","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.pmcj.2011.10.008","volume":"8","author":"E Papadopoulou","year":"2012","unstructured":"Papadopoulou, E., Gallacher, S., Taylor, N.K., Williams, M.H.: A personal smart space approach to realising ambient ecologies. Pervasive Mob. Comput. 8(4), 485\u2013499 (2012)","journal-title":"Pervasive Mob. Comput."},{"key":"229_CR45","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-0-387-71058-7_8","volume-title":"Mob. Wirel. Netw. Secur. Priv.","author":"V Ramakrishna","year":"2007","unstructured":"Ramakrishna, V., Eustice, K., Schnaider, M.: Approaches for ensuring security and privacy in unplanned ubiquitous computing interactions. In: Reiher, P., Makki, K., Pissinou, N., Makki, S., Makki, S. (eds.) Mob. Wirel. Netw. Secur. Priv., pp. 167\u2013189. Springer, US (2007)"},{"key":"229_CR46","unstructured":"Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the USENIX Security Symposium, Security \u201912, pp. 15\u201315. USENIX Association (2012)"},{"key":"229_CR47","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-3-540-39881-3_15","volume-title":"Security in Pervasive Computing. Lecture Notes in Computer Science","author":"P Robinson","year":"2004","unstructured":"Robinson, P., Beigl, M.: Trust context spaces: an infrastructure for pervasive security in context-aware environments. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. Lecture Notes in Computer Science, vol. 2802, pp. 157\u2013172. Springer, Berlin (2004)"},{"issue":"5","key":"229_CR48","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1016\/j.jnca.2010.03.028","volume":"33","author":"BP Rocha","year":"2010","unstructured":"Rocha, B.P., Costa, D.N., Moreira, R.A., Rezende, C.G., Loureiro, A.A., Boukerche, A.: Adaptive security protocol selection for mobile computing. J. Netw. Comput. Appl. 33(5), 569\u2013587 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"229_CR49","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-23641-9_27","volume-title":"Ubiquitous Intelligence and Computing. Lecture Notes in Computer Science","author":"A Sabzevar","year":"2011","unstructured":"Sabzevar, A., Sousa, J.: Chameleon: a model of identification, authorization and accountability for ubicomp. In: Hsu, C.H., Yang, L., Ma, J., Zhu, C. (eds.) Ubiquitous Intelligence and Computing. Lecture Notes in Computer Science, vol. 6905, pp. 326\u2013339. Springer, Berlin (2011)"},{"issue":"1","key":"229_CR50","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MIC.2003.1167341","volume":"7","author":"R Sandhu","year":"2003","unstructured":"Sandhu, R.: Good-enough security. Internet Comput. 7(1), 66\u201368 (2003)","journal-title":"Internet Comput."},{"key":"229_CR51","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-3-540-77086-2_8","volume-title":"Information Systems Security. Lecture Notes in Computer Science","author":"A Saxena","year":"2007","unstructured":"Saxena, A., Lacoste, M., Jarboui, T., L\u00fccking, U., Steinke, B.: A software framework for autonomic security in pervasive environments. In: McDaniel, P., Gupta, S. (eds.) Information Systems Security. Lecture Notes in Computer Science, vol. 4812, pp. 91\u2013109. Springer, Berlin (2007)"},{"issue":"1","key":"229_CR52","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MPRV.2011.81","volume":"11","author":"A Schmidt","year":"2012","unstructured":"Schmidt, A., Pfleging, B., Alt, F., Sahami, A., Fitzpatrick, G.: Interacting with 21st-century computers. Pervasive Comput. 11(1), 22\u201331 (2012)","journal-title":"Pervasive Comput."},{"key":"229_CR53","doi-asserted-by":"crossref","unstructured":"Shirey, R.W: Internet security glossary, version 2. Technical Report RFC: 4949, The Internet Engineering Task Force (IETF) (2007)","DOI":"10.17487\/rfc4949"},{"key":"229_CR54","doi-asserted-by":"crossref","unstructured":"Spanoudakis, G., Kokolakis, S., Gomez, A.M.: Security and Dependability for Ambient Intelligence. Springer, Berlin (2009)","DOI":"10.1007\/978-0-387-88775-3"},{"key":"229_CR55","unstructured":"Stallings, W., Brown, L.V.: Computer Security: Principles and practice. Prentice-Hall, New Jersey (2008)"},{"key":"229_CR56","first-page":"83","volume-title":"Location- and Context-Awareness. Lecture Notes in Computer Science","author":"M Strimpakou","year":"2005","unstructured":"Strimpakou, M., Roussaki, I., Pils, C., Angermann, M., Robertson, P., Anagnostou, M.: Context modelling and management in ambient-aware pervasive environments. In: Strang, T., Linnhoff-Popien, C. (eds.) Location- and Context-Awareness. Lecture Notes in Computer Science, vol. 3479, pp. 83\u201394. Springer, Berlin (2005)"},{"key":"229_CR57","unstructured":"The Australian Signals Directorate: Risk management of enterprise mobility including bring your own device. Technical report, Australian Governament, Department of Defence, Intelligence and Security (2013)"},{"key":"229_CR58","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.: Models, protocols, and architectures for secure pervasive computing: challenges and research directions. In: Proceedings of the IEEE Conference on Pervasive Computing and Communications, PerCom \u201904, pp. 164\u2013168. IEEE Computer Society (2004)","DOI":"10.1109\/PERCOMW.2004.1276925"},{"key":"229_CR59","doi-asserted-by":"crossref","unstructured":"Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: Proteus: a semantic context-aware adaptive policy model. In: Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY \u201907, pp. 129\u2013140. IEEE Computer Society (2007)","DOI":"10.1109\/POLICY.2007.40"},{"issue":"3","key":"229_CR60","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Sci. Am. 265(3), 94\u2013104 (1991)","journal-title":"Sci. Am."},{"issue":"1","key":"229_CR61","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.pmcj.2011.01.004","volume":"8","author":"J Ye","year":"2012","unstructured":"Ye, J., Dobson, S., McKeever, S.: Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8(1), 36\u201366 (2012)","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"229_CR62","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s11277-009-9782-4","volume":"55","author":"R Zhang","year":"2010","unstructured":"Zhang, R., Giunchiglia, F., Crispo, B., Song, L.: Relation-based access control: an access control model for context-aware computing environment. Wirel. Pers. Commun. 55(1), 5\u201317 (2010)","journal-title":"Wirel. Pers. Commun."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0229-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-014-0229-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0229-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:41:31Z","timestamp":1746146491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-014-0229-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,8]]},"references-count":62,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["229"],"URL":"https:\/\/doi.org\/10.1007\/s10207-014-0229-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2014,3,8]]}}}