{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T07:55:58Z","timestamp":1709452558242},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T00:00:00Z","timestamp":1501804800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11277-017-4740-z","type":"journal-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T01:48:46Z","timestamp":1501811326000},"page":"4587-4619","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Spatial and Temporal Organization Based Access Control for Wireless Network as a Component of Security Requirements"],"prefix":"10.1007","volume":"97","author":[{"given":"Chaimaa","family":"Belbergui","sequence":"first","affiliation":[]},{"given":"Najib","family":"Elkamoun","sequence":"additional","affiliation":[]},{"given":"Rachid","family":"Hilal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,4]]},"reference":[{"key":"4740_CR1","unstructured":"Anzevui, J. (2006). Les r\u00e9seaux sans fil. In Proj. Semest. Univ. Gen\u00e8ve (Vol. 2007)."},{"key":"4740_CR2","unstructured":"Ministre, P. (2013). Note technique, Recommandations de s\u00e9curit\u00e9 relatives aux r\u00e9seaux Wi-Fi, 2013 (pp. 1\u201312)."},{"key":"4740_CR3","unstructured":"Asip, S. (2014). Guide pratique sp\u00e9cifique pour la mise en place d\u2019un acc\u00e8s Wifi. Mai 2014-V1.0 (pp. 1\u201312)."},{"key":"4740_CR4","doi-asserted-by":"crossref","unstructured":"Fathy, M., Azer, M., Bahgat, M., & Yehia, A. (2013). Security access control research trends. In Wireless and mobile networking conference (WMNC), 2013 6th joint IFIP, 2013 (pp. 1\u20136).","DOI":"10.1109\/WMNC.2013.6549056"},{"key":"4740_CR5","unstructured":"Ferraiolo, D. F., & Kuhn, D. R. (2009). Role-based access controls. ArXiv Prepr. ArXiv09032171."},{"key":"4740_CR6","unstructured":"Hansen, F. & Oleshchuk, V. (2003). Application of role-based access control in wireless healthcare information systems. In Scandinavian conference in health informatics, 2003 (pp. 30\u201333)."},{"key":"4740_CR7","doi-asserted-by":"crossref","unstructured":"Hansen, F., & Oleshchuk, V. (2003). Spatial role-based access control model for wireless networks. In Proceedings of the 58th IEEE vehicular technology conference (VTC\u201903), 2003 (Vol. 3). IEEE Computer Society.","DOI":"10.1109\/VETECF.2003.1285394"},{"key":"4740_CR8","unstructured":"Tomur, E., Deregozu, R., & Genc, T. (2006). A wireless secure remote access architecture implementing role based access control: WiSeR. In Proceedings of world academy of science, engineering and technology."},{"issue":"6","key":"4740_CR9","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.cose.2006.05.007","volume":"25","author":"E Tomur","year":"2006","unstructured":"Tomur, E., & Erten, Y. M. (2006). Application of temporal and spatial role based access control in 802.11 wireless networks. Computers & Securit, 25(6), 452\u2013458.","journal-title":"Computers & Securit"},{"key":"4740_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H. C. (2015, September). A negotiated virtual role solution in RBAC scheme for group-based heterogeneous wireless networks. In\u00a0Network-Based Information Systems (NBiS), 2015 18th International Conference on\u00a0IEEE (pp. 146\u2013150).","DOI":"10.1109\/NBiS.2015.25"},{"key":"4740_CR11","doi-asserted-by":"crossref","unstructured":"Kalam, A. A. E., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., & Trouessin, G. (2003). Organization based access control. In IEEE 4th international workshop on policies for distributed systems and networks, 2003. Proceedings. POLICY 2003 (pp. 120\u2013131).","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"4740_CR12","doi-asserted-by":"crossref","unstructured":"Ouaddah, A., Bouij-Pasquier, I., Abou Elkalam, A., & Ouahman, A. A. (2015). Security analysis and proposal of new access control model in the internet of thing. In 2015 international conference on electrical and information technologies (ICEIT) (pp. 30\u201335).","DOI":"10.1109\/EITech.2015.7162936"},{"issue":"7","key":"4740_CR13","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.jss.2011.02.005","volume":"84","author":"S Preda","year":"2011","unstructured":"Preda, S., Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144\u20131159.","journal-title":"Journal of Systems and Software"},{"key":"4740_CR14","volume-title":"Policy-based network management: Solutions for the next generation","author":"J Strassner","year":"2004","unstructured":"Strassner, J. (2004). Policy-based network management: Solutions for the next generation. Amsterdam: Morgan Kaufmann Publishers."},{"key":"4740_CR15","unstructured":"Autrel, F., Cuppens, F., Cuppens-Boulahia, N., & Coma, C. (2008). MotOrBAC 2: A security policy tool. In 3rd conference on security in network architectures and information systems (SAR-SSI 2008) (pp. 273\u2013288), Loctudy, France."},{"key":"4740_CR16","unstructured":"Bertino, E., Catania, B., Damiani, M. L., Perlasca, P. (2005). GEO-RBAC: A spatially aware RBAC. In SACMAT\u201905: Proceedings of the tenth ACM symposium on Access control models and technologies (pp. 29\u201337). New York: ACM Press."},{"key":"4740_CR17","doi-asserted-by":"crossref","unstructured":"Ray, I., Kumar, M., Yu, L. (2006). LRBAC: A location-aware role-based access control model. In Proceedings of the 2nd international conference on information systems security (pp. 147\u2013161), Kolkata, India.","DOI":"10.1007\/11961635_10"},{"key":"4740_CR18","unstructured":"Bertino, E., Catania, B., Damiani, M. L., Perlasca, P. (2005). GEO-RBAC: A spatially aware RBAC. In SACMAT\u201905: Proceedings of the tenth ACM symposium on access control models and technologies (pp. 29\u201337). New York: ACM Press."},{"issue":"1","key":"4740_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"JBD Joshi","year":"2005","unstructured":"Joshi, J. B. D., Bertino, E., Latif, U., & Ghafoor, A. (2005). A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 17(1), 4\u201323.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4740-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4740-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4740-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T16:06:35Z","timestamp":1558109195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4740-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,4]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4740"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4740-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,4]]},"assertion":[{"value":"4 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}