{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:09:00Z","timestamp":1730203740699,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1109\/ccnc.2009.4784990","type":"proceedings-article","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T23:13:08Z","timestamp":1235085188000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Activity-Oriented Access Control for Ubiquitous Environments"],"prefix":"10.1109","author":[{"given":"Le Xuan","family":"Hung","sequence":"first","affiliation":[]},{"given":"Riaz Ahmed","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Jameel","sequence":"additional","affiliation":[]},{"given":"S. M. K. R","family":"Raazi","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Weiwei","sequence":"additional","affiliation":[]},{"given":"Ngo Trong","family":"Canh","sequence":"additional","affiliation":[]},{"given":"P. T. H.","family":"Truc","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yuseung","family":"Son","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"activity-based computing - lessons learned and open issues","author":"bardram","year":"2005","journal-title":"Workshop on Activity - From a Theoretical to a Computational Construct (ECSCW)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2510"},{"year":"0","key":"12"},{"key":"3","first-page":"27","article-title":"dynamic protection structures","volume":"35","author":"lampson","year":"1969","journal-title":"AFIPS Conference Proc"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0335-2"},{"key":"1","first-page":"94","article-title":"scientifc america","author":"weiser","year":"1991","journal-title":"The Computer for the 21st Century"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"7","article-title":"generalized role-based access control for securing future applications","author":"covington","year":"2000","journal-title":"23rd National Information Systems Security Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"year":"0","key":"5"},{"journal-title":"Secure computer systems Mathematical foundations and model","year":"1973","author":"bell","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2004.1347784"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"}],"event":{"name":"2009 6th IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2009,1,10]]},"location":"Las Vegas, Nevada, USA","end":{"date-parts":[[2009,1,13]]}},"container-title":["2009 6th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4784683\/4784684\/04784990.pdf?arnumber=4784990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:32:22Z","timestamp":1489771942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4784990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2009.4784990","relation":{},"subject":[],"published":{"date-parts":[[2009,1]]}}}