{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:39:56Z","timestamp":1757777996311},"reference-count":24,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176306","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T11:35:00Z","timestamp":1056627300000},"page":"343-352","source":"Crossref","is-referenced-by-count":46,"title":["Access control for Active Spaces"],"prefix":"10.1109","author":[{"given":"G.","family":"Sampemane","sequence":"first","affiliation":[]},{"given":"P.","family":"Naldurg","sequence":"additional","affiliation":[]},{"given":"R.H.","family":"Campbell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Common object request broker architecture (CORBA\/IIOP)","year":"0","author":"group","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-40002-8_27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1012339"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993146"},{"key":"ref14","first-page":"437","article-title":"Protection","author":"lampson","year":"1971","journal-title":"Proceedings of the 5th Princeton Symposium on Inforamtion Sciences and Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0496-68"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/MPRV.2002.1158281","article-title":"GaiaOS: A middleware infrastructure to enable active spaces","author":"rom\u00e1n","year":"2002","journal-title":"IEEE Pervasive Computing (to appear)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143461"},{"key":"ref4","article-title":"Gaia: A development infrastructure for active spaces","author":"cerqueira","year":"2001","journal-title":"Workshop on Application Models and Programming Tools for Ubiquitous Computing (Held in Conjunction with the UBICOMP 2001)"},{"key":"ref3","article-title":"Integrity considerations for secure computer systems","author":"biba","year":"1975","journal-title":"The MITRE Corporation Technical Report MTR- 3153"},{"journal-title":"Cryptography and Data Security","year":"1982","author":"denning","key":"ref6"},{"key":"ref5","first-page":"115","article-title":"Generalized role-based access control for securing future applications","author":"covington","year":"2000","journal-title":"23rd National Information Systems Security Conference"},{"key":"ref8","article-title":"Role-based access controls","author":"ferraiolo","year":"1992","journal-title":"Proceedings of the 15th NIST-NSA National Computer Security Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"ref2","first-page":"63","article-title":"Ambient telepresence","author":"beigl","year":"1999","journal-title":"Proceedings of the Workshop on Changing Places"},{"key":"ref1","article-title":"A domain and type enforcement UNIX prototype","author":"badger","year":"1995","journal-title":"Proceedings of the 5th Usenix UNIX Security Symposium"},{"article-title":"Dynamic policy-driven role-based access control for active spaces","year":"2001","author":"gill","key":"ref9"},{"key":"ref20","article-title":"A security policy configuration for security-enhanced linux","author":"smalley","year":"2001","journal-title":"Technical Report"},{"journal-title":"Sun Microsystems Trusted Solaris","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35607-5_2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_12"},{"article-title":"Security architecture in Gaia","year":"2001","author":"viswanathan","key":"ref23"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176306.pdf?arnumber=1176306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:46:19Z","timestamp":1497552379000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176306","relation":{},"subject":[]}}