{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:26:09Z","timestamp":1775075169567,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T00:00:00Z","timestamp":1444694400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s12243-015-0480-9","type":"journal-article","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T20:56:15Z","timestamp":1444769775000},"page":"121-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control"],"prefix":"10.1007","volume":"71","author":[{"given":"L\u00e9on","family":"Lim","sequence":"first","affiliation":[]},{"given":"Pierrick","family":"Marie","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Conan","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Chabridon","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Desprats","sequence":"additional","affiliation":[]},{"given":"Atif","family":"Manzoor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,13]]},"reference":[{"key":"480_CR1","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/2335484.2335509","volume-title":"6th ACM International Conference on Distributed Event-Based Systems","author":"R Barazzutti","year":"2012","unstructured":"Barazzutti R, Felber P, Mercier H, Onica E, Rivi\u00e8re E (2012) Thrifty privacy: efficient support for privacy-preserving publish\/subscribe. In: 6th ACM International Conference on Distributed Event-Based Systems. ACM, NY, USA, pp 225\u2013236"},{"key":"480_CR2","doi-asserted-by":"crossref","unstructured":"Barnaghi P, Wei W, Cory H, Taylor K (2012) Semantics for the internet of things: early progress and back to the future, vol 8","DOI":"10.4018\/jswis.2012010101"},{"issue":"4","key":"480_CR3","doi-asserted-by":"crossref","first-page":"24:1","DOI":"10.1145\/2333112.2333119","volume":"44","author":"P Bellavista","year":"2012","unstructured":"Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(4):24:1\u201324:45","journal-title":"ACM Comput Surv"},{"key":"480_CR4","doi-asserted-by":"crossref","unstructured":"Belokosztolszki A, Eyers DM, Pietzuch PR, Bacon J, Moody K (2003) Role-based access control for publish\/subscribe middleware architectures. In: 2nd International Workshop on Distributed Event-based Systems, pp 1\u20138","DOI":"10.1145\/966618.966622"},{"key":"480_CR5","doi-asserted-by":"crossref","unstructured":"Bouzeghoub A, Taconet C, Jarraya A, Do NK, Conan D (2010) Complementarity of process-oriented and ontology-based context managers to identify situations. In: Proceedings 5th International Conference on Digital Information Management, Thunder Bay, Canada","DOI":"10.1109\/ICDIM.2010.5664620"},{"key":"480_CR6","unstructured":"Buchholz T, Kupper A, Schiffers M (2003) Quality of context information: what it is and why we need it. In: 10th International Workshop of HPOVUA, Geneva"},{"issue":"1","key":"480_CR7","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12243-013-0387-2","volume":"69","author":"S Chabridon","year":"2014","unstructured":"Chabridon S, Laborde R, Desprats T, Oglaza A, Marie P, Machara Marquez S (2014) A Survey on addressing privacy together with quality of context for context management in the internet of things. Ann Telecommun 69(1):47\u201362","journal-title":"Ann Telecommun"},{"key":"480_CR8","first-page":"1996","volume-title":"Proceedings of the 2006 International Conference on On the Move to Meaningful Internet Systems","author":"MJ Covington","year":"2006","unstructured":"Covington MJ, Sastry MR (2006) A contextual attribute-based access control model. In: Proceedings of the 2006 International Conference on On the Move to Meaningful Internet Systems. Springer-Verlag, Berlin, Heidelberg, pp 1996\u20132006"},{"key":"480_CR9","unstructured":"Dey AK Understanding and using context. Pers Ubiquit Comput 5(1):4\u20137"},{"key":"480_CR10","doi-asserted-by":"crossref","unstructured":"Esposito C, Ciampi M (2015) On security in publish\/subscribe services: a Survey. IEEE Communications Surveys & Tutorials, (on-line)","DOI":"10.1109\/COMST.2014.2364616"},{"key":"480_CR11","doi-asserted-by":"crossref","unstructured":"Eugster PT, Felber P, Guerraoui R, Kermarrec A-M (2003) The many faces of publish\/subscribe. ACM Comput Surv 35(2)","DOI":"10.1145\/857076.857078"},{"key":"480_CR12","doi-asserted-by":"crossref","unstructured":"Fanelli M, Foschini L, Corradi A, Boukerche A (2011) QoC-based context data caching for disaster area scenarios. In: IEEE International Conference on Communications, Kyoto, Japan, 5-9, pp 1\u20135","DOI":"10.1109\/icc.2011.5963361"},{"issue":"1-2","key":"480_CR13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s12243-013-0397-0","volume":"69","author":"V Garg","year":"2014","unstructured":"Garg V, Camp L, Lorenzen-Huber L, Shankar K, Connelly K (2014) Privacy concerns in assisted living technologies. Ann Telecommun 69(1-2):75\u201388","journal-title":"Ann Telecommun"},{"key":"480_CR14","doi-asserted-by":"crossref","unstructured":"Henricksen K, Indulska J (2004) Modelling and using imperfect context information. In: 1st IEEE PerCom Workshop CoMoRea, pp 33\u201337","DOI":"10.1109\/PERCOMW.2004.1276901"},{"issue":"2","key":"480_CR15","first-page":"16:1","volume":"46","author":"A-M Kermarrec","year":"2013","unstructured":"Kermarrec A-M, Triantafillou P (2013) XL peer-to-peer pub\/sub systems. ACM Comput Surv 46 (2):16:1\u201316:45","journal-title":"ACM Comput Surv"},{"key":"480_CR16","doi-asserted-by":"crossref","unstructured":"Kuka C, Nicklas D (2014) Quality matters: supporting quality-aware pervasive applications by probabilistic data stream management. In: The 8th ACM International Conference on Distributed Event-Based Systems, pp 1\u201312","DOI":"10.1145\/2611286.2611292"},{"key":"480_CR17","doi-asserted-by":"crossref","unstructured":"Machara Marquez S, Chabridon S, Taconet C (2013) Trust-based context contract models for the internet of things. In: 10th IEEE UIC\/ATC Conference","DOI":"10.1109\/UIC-ATC.2013.73"},{"key":"480_CR18","doi-asserted-by":"crossref","unstructured":"Marie P, Desprats T, Chabridon S, Sibilla M QoCIM: a meta-model for quality of context. In: 8th International Interdisciplinary Conference on Modeling and Using Context, volume 8175 of LNCS. Springer, p 2013","DOI":"10.1007\/978-3-642-40972-1_23"},{"key":"480_CR19","first-page":"8","volume-title":"1st Workshop on Middleware for Context-Aware Applications in the IoT, 15th Middleware Conference","author":"P Marie","year":"2014","unstructured":"Marie P, Lim L, Manzoor A, Chabridon S, Conan D, Desprats T (2014) QoC-aware context data distribution in the internet of things. In: 1st Workshop on Middleware for Context-Aware Applications in the IoT, 15th Middleware Conference. ACM, Bordeaux, France, pp 8\u201312"},{"key":"480_CR20","doi-asserted-by":"crossref","unstructured":"M\u00fchl G, Fiege L, Pietzuch PR (2006) Distributed event-based systems. Springer","DOI":"10.1109\/MDSO.2007.8"},{"key":"480_CR21","doi-asserted-by":"crossref","unstructured":"Nabeel M, Appel S, Bertino E, Buchmann AP (2013) Privacy preserving context aware publish subscribe systems in springer, editor, 7th International Conference on Network and System Security","DOI":"10.1007\/978-3-642-38631-2_34"},{"key":"480_CR22","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.pmcj.2013.07.012","volume":"11","author":"E Ngai","year":"2014","unstructured":"Ngai E, Gunningberg P (2014) Quality-of-information-aware data collection for mobile sensor networks. Pervasive Mob Comput 11:203\u2013215","journal-title":"Pervasive Mob Comput"},{"key":"480_CR23","unstructured":"PCAST (President\u2019s Council of Advisors on Science and Technology) (2014) Big Data and privacy: a technological perspective, www.whitehouse.gov\/ostp\/pcast"},{"key":"480_CR24","doi-asserted-by":"crossref","unstructured":"Oglaza A, Laborde R, Zarat\u00e9 P (2013) Authorization policies: using decision support system for context-aware protection of user\u2019s private data. In: 5th IEEE UbiSafe Sympoisum, TrustCom, pp 1639\u20131644","DOI":"10.1109\/TrustCom.2013.202"},{"key":"480_CR25","doi-asserted-by":"crossref","unstructured":"Shelby Z, Hartke K, Bormann C (2014) Constrained application protocol (CoAP). IETF, Request for Comments, https:\/\/tools.ietf.org\/html\/rfc7252","DOI":"10.17487\/rfc7252"},{"key":"480_CR26","doi-asserted-by":"crossref","unstructured":"Sweeney L, Abu A, Winn J (2013) Identifying participants in the personal genome project by name. Social science research network, doi: 10.2139\/ssrn.2257732","DOI":"10.2139\/ssrn.2257732"},{"issue":"11","key":"480_CR27","doi-asserted-by":"crossref","first-page":"2644","DOI":"10.1109\/TKDE.2012.177","volume":"25","author":"R Weixiong","year":"2013","unstructured":"Weixiong R, Lei C, Sasu T (2013) Toward efficient filter privacy-aware content-based pub\/sub systems. IEEE Trans Knowl Data Eng 25(11):2644\u20132657","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"480_CR28","unstructured":"eXtensible Access Control Markup Language (XACML) Version 3.0. docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html (2013)"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-015-0480-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-015-0480-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-015-0480-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T03:18:54Z","timestamp":1653275934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-015-0480-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,13]]},"references-count":28,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["480"],"URL":"https:\/\/doi.org\/10.1007\/s12243-015-0480-9","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,13]]}}}