{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:25Z","timestamp":1725533605839},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_85","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"829-837","source":"Crossref","is-referenced-by-count":1,"title":["Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate"],"prefix":"10.1007","author":[{"given":"Hoon","family":"Ko","sequence":"first","affiliation":[]},{"given":"Ning","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Goreti","family":"Marreiros","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Ramos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"85_CR1","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2006.03.006","volume":"25","author":"M. Ma","year":"2006","unstructured":"Ma, M., Woodhead, S.: Authentication delegation for subscription-based remote network services. Computers & Security\u00a025, 371\u2013378 (2006)","journal-title":"Computers & Security"},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"Aura, T.: Distributed Access Rights Management with Delegation Certificates. Secure Internet programming: security issues for mobile and distributed objects, 211\u2013235 (2001)","DOI":"10.1007\/3-540-48749-2_9"},{"key":"85_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2003.1189190","volume":"7","author":"D.W. Chadwick","year":"2003","unstructured":"Chadwick, D.W., Otenko, A., Ball, E.: Role-Based Access Control With X.509 Attribute Certificates. IEEE Internet Computing\u00a07, 62\u201369 (2003)","journal-title":"IEEE Internet Computing"},{"key":"85_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11927587_20","volume-title":"Information Security and Cryptology \u2013 ICISC 2006","author":"H. Kim","year":"2006","unstructured":"Kim, H., Lee, Y., Chung, B., Yoon, H., Lee, J., Jung, K.: Digital Right management with right delegation for home networks. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 233\u2013245. Springer, Heidelberg (2006)"},{"issue":"2","key":"85_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MIS.2008.19","volume":"23","author":"C. Ramos","year":"2008","unstructured":"Ramos, C., Augusto, J.C., Shapiro, D.: Ambient intelligence the next step for artificial intelligence. IEEE Intelligent Systems\u00a023(2), 15\u201318 (2008)","journal-title":"IEEE Intelligent Systems"},{"key":"85_CR6","doi-asserted-by":"crossref","unstructured":"Vu, T.H.N., Ryu, K.H., Park, N.: A method for predicting future location of mobile user for location-based services system. Computers & Industrial Engineering (2008)","DOI":"10.1016\/j.cie.2008.07.009"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Zhuang, X., Serrano, M.J., Cain, H.W., Choi, J.-D.: Accurate, Efficient, and Adaptive Calling Context Profiling. In: PLDI 2006, June 10-16, pp. 263\u2013271 (2007)","DOI":"10.1145\/1133255.1134012"},{"key":"85_CR8","doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., Want, R.: Context-Aware Computing Applications. In: 1st International Workshop on Mobile Computing Systems and Applications, pp. 85\u201390 (1994)","DOI":"10.1109\/WMCSA.1994.16"},{"key":"85_CR9","unstructured":"Dey, A.: Providing Architectural Support for Building Context-Aware Applications. PhD thesis, Georgia Institute of Technology, Georgia (November 2000)"},{"key":"85_CR10","unstructured":"Chen, G., Kotz, D.: A Survey of Context-Aware Mobile Computing Research. Technical Report: TR2000-381 Dartmouth College, Hanover, NH, USA (2007)"},{"key":"85_CR11","doi-asserted-by":"crossref","unstructured":"Lee, W.-P.: Deploying personalized mobile services in an agent-based Environment. Expert Systems with Applications, pp. 1194\u20131207 (2007)","DOI":"10.1016\/j.eswa.2006.02.009"},{"key":"85_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/11827405_42","volume-title":"Database and Expert Systems Applications","author":"B.-H. Lee","year":"2006","unstructured":"Lee, B.-H., Kim, H.-N., Jung, J.-G., Jo, G.S.: Location-based service with context data for a restaurant recommendation. In: Bressan, S., K\u00fcng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol.\u00a04080, pp. 430\u2013438. Springer, Heidelberg (2006)"},{"key":"85_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-540-77002-2_24","volume-title":"Progress in Artificial Intelligence","author":"C. Ramos","year":"2007","unstructured":"Ramos, C.: Ambient Intelligence \u2013 A State of the Art from Artificial Intelligence Perspective. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS, vol.\u00a04874, pp. 285\u2013295. Springer, Heidelberg (2007)"},{"key":"85_CR14","unstructured":"Yang, S.J.H.: Context-Aware Ubiquitous Learning Environments for Peer-to-Peer Collaborative Learning. In: Educational Technology & Society, Security, pp. 188\u2013201 (2006)"},{"key":"85_CR15","doi-asserted-by":"crossref","unstructured":"Vieira, M.S., Rosa, N.S.: A Reconfigurable Group Management Middleware Service for Wireless Sensor Networks. In: MPAC 2005, pp. 1\u20138 (November 2005)","DOI":"10.1145\/1101480.1101490"},{"key":"85_CR16","unstructured":"IST Advisory Group, Scenarios for Ambient Intelligence in 2010, European Commission (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_85","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:36:03Z","timestamp":1558395363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_85","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}