{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:53:06Z","timestamp":1761979986486,"version":"build-2065373602"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11036-014-0516-9","type":"journal-article","created":{"date-parts":[[2014,6,13]],"date-time":"2014-06-13T06:56:34Z","timestamp":1402642594000},"page":"392-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance"],"prefix":"10.1007","volume":"19","author":[{"given":"Meriem","family":"Zerkouk","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Cavalcante","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Mhamed","sequence":"additional","affiliation":[]},{"given":"Jerome","family":"Boudy","sequence":"additional","affiliation":[]},{"given":"Belhadri","family":"Messabih","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,14]]},"reference":[{"key":"516_CR1","volume-title":"Disability and assistive technology systems. In assistive technology for visually impaired and blind people (pp. 1\u201350)","author":"A Marion","year":"2008","unstructured":"Marion A, Hersh D, Michael A, Johnson U (2008) Disability and assistive technology systems. In assistive technology for visually impaired and blind people (pp. 1\u201350). Springer, London"},{"issue":"4","key":"516_CR2","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.pmcj.2009.04.001","volume":"5","author":"DJ Cook","year":"2009","unstructured":"Cook DJ, Augusto JC, Jakkula VR (2009) Ambient intelligence: technologies, applications, and opportunities. Journal of Pervasive and Mobile Computing 5(4):277\u2013298","journal-title":"Journal of Pervasive and Mobile Computing"},{"key":"516_CR3","first-page":"349","volume-title":"Sensor networks","author":"M Douglas","year":"2009","unstructured":"Douglas M, Guang-Zhong Y (2009) Body sensor networks for sport, wellbeing and health. In: Sensor networks. Springer, Berlin Heidelberg, pp 349\u2013381"},{"key":"516_CR4","volume-title":"An architecture to combine context awareness and body sensor networks for health care applications, in ambient assistive health and wellness management in the heart of the city (icost), pp 90\u201397","author":"A Salmeri","year":"2009","unstructured":"Salmeri A, Licciardi CA, Lamorte L, Valla M, Giannantonio R, Sgroi M (2009) An architecture to combine context awareness and body sensor networks for health care applications, in ambient assistive health and wellness management in the heart of the city (icost), pp 90\u201397. Springer, Berlin Heidelberg"},{"key":"516_CR5","doi-asserted-by":"crossref","unstructured":"Varshney, U. (2009) \u201cPervasive Healthcare Computing: EMR\/EHR\u201d, Wireless and Health Monitoring.","DOI":"10.1007\/978-1-4419-0215-3"},{"key":"516_CR6","doi-asserted-by":"crossref","unstructured":"Atallah, L., Lo, B., Yang, G-Z. (2012). Can pervasive sensing address current challenges in global healthcare?, Journal of Epidemiology and Global Health, (pp. 1\u2013 13)","DOI":"10.1016\/j.jegh.2011.11.005"},{"key":"516_CR7","volume-title":"R\u00e9seaux \u00c9videntiels pour la fusion de donn\u00e9es multimodales h\u00e9t\u00e9rog\u00e8nes : application \u00e0 la d\u00e9tection de chutes\u201d, Institut Mines T\u00e9l\u00e9com SudParis, thesis reoprt","author":"PAA Cavalcante","year":"2012","unstructured":"Cavalcante PAA (2012) R\u00e9seaux \u00c9videntiels pour la fusion de donn\u00e9es multimodales h\u00e9t\u00e9rog\u00e8nes : application \u00e0 la d\u00e9tection de chutes\u201d, Institut Mines T\u00e9l\u00e9com SudParis, thesis reoprt"},{"key":"516_CR8","unstructured":"Medjahed, H. (2010) \u201cDistress situation identification by multimodal data fusion for home healthcare tele monitoring\u201d, Institut Mines T\u00e9l\u00e9com - T\u00e9l\u00e9com SudParis,thesis report."},{"key":"516_CR9","unstructured":"Steenkeste, F., Bocquet, H., Chan, M., and Vellas, B. (1999). \u201cRemote monitoring system for elders in a geriatric hospital\u201d, in Promoting Independence & Quality of Life for older persons: an international conference on aging Arlington, (pp. 2\u20134)."},{"key":"516_CR10","unstructured":"Baldinger, J.-L., Boudy, J. B., Dorizzi, Levrey, J.-P., Andreao, R., Perp\u00e8re, C., Delavault, F., Rocaries, F., Dietrich, C., and Lacombe, A. (2004). Tele-surveillance System for Patient at Home: the MEDIVILLE system\u201d, in Computers Helping People with Special Needs, (pp. 400\u2013407), Springer."},{"issue":"2","key":"516_CR11","first-page":"264","volume":"10","author":"D Istrate","year":"2006","unstructured":"Istrate D, Castelli E, Vacher M, Besacier L, Serignat J-F (2006) Information extraction from sound for medical tele monitoring\u201d, information technology in biomedicine. IEEE Transactions 10(2):264\u2013274","journal-title":"IEEE Transactions"},{"key":"516_CR12","unstructured":"Asmidar. A, Roslan. I., Jamilin, J. (2009). A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment. In International Conference on Intelligent Pervasive Computing, IEEE, (pp. 533\u2013535)."},{"key":"516_CR13","doi-asserted-by":"crossref","unstructured":"Zerkouk, M., M'hamed, A., Messabih, B.(2012) User behavior and capability based access control model and architecture. NetCoM '12 : The Fourth International Conference on Networks & Communications, (pp. 291\u2013299), New-York : Springer","DOI":"10.1007\/978-1-4614-6154-8_29"},{"issue":"1","key":"516_CR14","doi-asserted-by":"crossref","first-page":"171","DOI":"10.5121\/ijcnc.2013.5112","volume":"5","author":"M Zerkouk","year":"2013","unstructured":"Zerkouk M, M'hamed A, Messabih B (2013) A user profile based access control model and architecture. International journal of computer networks & communications (IJCNC) 5(1):171\u2013181","journal-title":"International journal of computer networks & communications (IJCNC)"},{"key":"516_CR15","doi-asserted-by":"crossref","unstructured":"M'hamed, A., Zerkouk, M., El Husseini, A., Messabih, B., El Hassan, B. (2013). Towards a context aware modeling of trust and access control based on the user behavior and capabilities . ICOST '13 : 11th International Conference On Smart homes and health Telematics, (pp. 69\u201376). London : Springer","DOI":"10.1007\/978-3-642-39470-6_9"},{"issue":"1","key":"516_CR16","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A Dey","year":"2001","unstructured":"Dey A (2001) Understanding and using context. Journal of Personal and Ubiquitous Computing 5(1):4\u20137","journal-title":"Journal of Personal and Ubiquitous Computing"},{"issue":"1","key":"516_CR17","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s11042-011-0940-9","volume":"67","author":"D Zhang","year":"2013","unstructured":"Zhang D, Huang H, Lai CF, Liang X, Zou Q, Guo M (2013) Survey on context-awareness in ubiquitous media. Multimedia Tools and Applications 67(1):179\u2013211","journal-title":"Multimedia Tools and Applications"},{"key":"516_CR18","unstructured":"Perera, C., Zaslavsky, A., Christen, P., and Georgakopoulos, D. (2013). Context Aware Computing for The Internet of Things: A Survey. Journal of IEEE COMMUNICATIONS SURVEYS & TUTORIALS, (pp. 1\u201341)"},{"issue":"12","key":"516_CR19","doi-asserted-by":"crossref","first-page":"1973","DOI":"10.1016\/j.jss.2007.03.010","volume":"80","author":"T Chaari","year":"2007","unstructured":"Chaari T, Ejigu D, Laforest F, Scuturic VM (2007) A comprehensive approach to model and use context for adapting applications in pervasive environments. J Syst Softw 80(12):1973\u20131992","journal-title":"J Syst Softw"},{"issue":"4","key":"516_CR20","doi-asserted-by":"crossref","first-page":"7448","DOI":"10.1016\/j.eswa.2008.09.002","volume":"36","author":"J Hong","year":"2009","unstructured":"Hong J, Suh E, Kim K, Kim S (2009) Context-aware system for proactive personalized service based on context history, journal. Expert Systems with Applications 36(4):7448\u20137457","journal-title":"Expert Systems with Applications"},{"key":"516_CR21","doi-asserted-by":"crossref","unstructured":"Riboni, D., Bettini, C., \u201cOWL 2 modeling and reasoning with human activities, In Pervasive and Mobile Computing\u201d, pp.(379\u2013395) (2011)","DOI":"10.1016\/j.pmcj.2011.02.001"},{"issue":"4","key":"516_CR22","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1108\/17440080911006199","volume":"5","author":"L Chen","year":"2009","unstructured":"Chen L, Nugent C (2009) Ontology-based activity recognition in intelligent pervasive environments. International Journal of Web Information Systems 5(4):410\u2013430","journal-title":"International Journal of Web Information Systems"},{"key":"516_CR23","volume-title":"Support vector machines for inhabitant identification in smart houses. In ubiquitous intelligence and computing, (pp. 83\u201395)","author":"R Kadouche","year":"2010","unstructured":"Kadouche R, Pigot H, Abdulrazak B, Giroux S (2010) Support vector machines for inhabitant identification in smart houses. In ubiquitous intelligence and computing, (pp. 83\u201395). Springer, Berlin Heidelberg"},{"issue":"2","key":"516_CR24","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.dss.2012.10.010","volume":"55","author":"A Copetti","year":"2013","unstructured":"Copetti A, Leite JCB, Loques O, Neves MF (2013) A decision-making mechanism for context inference in pervasive healthcare environment. Decis Support Syst 55(2):528\u2013537","journal-title":"Decis Support Syst"},{"key":"516_CR25","unstructured":"Wrona, K., and Gomez, L. (2005). Context-aware security and secure context-awareness in ubiquitous computing environments, XXI Autumn Meeting of Polish Information Processing Society, (pp. 255\u2013265)."},{"key":"516_CR26","unstructured":"Sadat Emami S., Amini M., Zokaei S.(2007). A Context-Aware Access Control Model for Pervasive Computing Environments. International Conference on Intelligent Pervasive Computing, IEEE, (pp. 51 \u2013 56)."},{"key":"516_CR27","unstructured":"Yao. H, Hu. H, Huang B., Li. R. (2005). Dynamic Role and Context Based Access Control for Grid Applications, Proc. Of The Sixth International Conference on Parallel and Distributed Computing, Applications and Tecology, (pp. 404 \u2013 406)."},{"key":"516_CR28","doi-asserted-by":"crossref","unstructured":"Choi, J., Kang, D., Jang,H., and Eom, Y.I. (2008) Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments, In IEEE International Conference Performance, Computing and Communications. (pp 491 \u2013 498).","DOI":"10.1109\/PCCC.2008.4745089"},{"key":"516_CR29","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.sysarc.2008.12.001","volume":"55","author":"L Sliman","year":"2009","unstructured":"Sliman L, Biennier F, Badr Y (2009) Security policy framework for context-aware and user preferences in e-services. J Syst Archit 55:275\u2013288","journal-title":"J Syst Archit"},{"issue":"6","key":"516_CR30","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1016\/S1007-0214(07)70179-7","volume":"12","author":"W Qin","year":"2007","unstructured":"Qin W, Shi Y, Suo Y (2007) Ontology-based context-aware middleware for smart spaces. Tsinghua Science and Technology 12(6):707\u2013713","journal-title":"Tsinghua Science and Technology"},{"issue":"3","key":"516_CR31","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2013.44","volume":"12","author":"J Favela","year":"2013","unstructured":"Favela J (2013) Behavior-aware computing: applications and challenges. Journal IEEE Pervasive Computing 12(3):14\u201317","journal-title":"Journal IEEE Pervasive Computing"},{"key":"516_CR32","unstructured":"R. Mayrhofer, H. radi, and A. Ferscha. (2004). Recognizing and predicting context by learning from user behavior,\u201d Radiomatics: journal of Communication Engineering, special issue on Advances in Mobile Multimedia, 1, 30\u201342."},{"key":"516_CR33","unstructured":"Weka, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"516_CR34","unstructured":"Prot\u00e9g\u00e9, http:\/\/protege.stanford.edu\/"},{"key":"516_CR35","unstructured":"Pellet, http:\/\/clarkparsia.com\/pellet\/"},{"key":"516_CR36","unstructured":"Jess, http:\/\/www.jessrules.com\/jess\/"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-014-0516-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-014-0516-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-014-0516-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T13:54:31Z","timestamp":1565531671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-014-0516-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["516"],"URL":"https:\/\/doi.org\/10.1007\/s11036-014-0516-9","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2014,6]]}}}